1. Common Criteria for Information Technology Security Evaluation, Version 3.1 (September 2006), http://www.commoncriteriaportal.org/public/expert/
2. Avizienis, A., Laprie, J.-C., Randall, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004), http://se2c.uni.lu/tiki/se2c-bib_download.php?id=2433
3. Côté, I., Hatebur, D., Heisel, M., Schmidt, H., Wentzlaff, I.: A systematic account of problem frames. In: Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP 2007). Universitätsverlag Konstanz (2008)
4. Courtois, P.-J.: Safety, reliability and software based systems requirements. In: Contribution to the UK ACSNI Report of the Study Group on the safety of Operational Computer Systems (June 1997)
5. Gürses, S., Jahnke, J.H., Obry, C., Onabajo, A., Santen, T., Price, M.: Eliciting confidentiality requirements in practice. In: CASCON 2005: Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, pp. 101–116. IBM Press (2005)