1. Merabti, M., Shi, Q., Oppliger, R.: Advanced security techniques for network protection. Computer Communications 23, 151–158 (2000)
2. Lambrinoudakis, C., Gritzalis, S., Dridi, F., Pernul, G.: Security requirements for e-government services: a methodological approach for developing a common pki-based security policy. Computer Communication 26, 1873–1883 (2003)
3. Lindskog, S.: Modeling and Tuning Security from a Quality of Service Perspective. PhD dissertation, Department of Computer Science and Engineering, Chalmers University of Technology, Gteborg, Sweden (2005)
4. Schneck, P., Schwan, K.: Authenticast: An Adaptive Protocol for High-Performance. Secure Network Applications, Technical Report GIT-CC-97-22 (1997)
5. Ong, C., Nahrstedt, K., Yuan, W.: Quality of protection for mobile applications. In: IEEE International Conference on Multimedia & Expo. (2003)