1. Brunil, R., Hisham, M.H., Jorge, M.: A methodological tool for asset identification in web applications. In: 2009 Fourth International Conference on Software Engineering Advances, pp. 413–418 (2009)
2. Web application security trends report, http://www.cenzic.com/downloads/Cenzic_AppSecTrends_Q3-Q4-2008.pdf
3. Sethi R.: The Importance of application classification in secure application development, version 1.0 (2007), http://www.webappsec.org/projects/articles/041607.shtml
4. Liu, L., Yu, E., Mylopoulos, J.: Secure Design Based on Social Modeling. COMPSAC 2006: Proceedings of the 30th Annual International Computer Software & Applications Conference, Chicago, Illinois, USA, pp. 71–76 (2006)
5. Long, T., Liu, L., Yu, Y., Jin, Z.: AVT Vector: A Quantitative Security Requirements Evaluation Approach based on Assets, Vulnerabilities and Trustworthiness of Environment. In: Proceedings of 17th IEEE International Requirements Engineering Conference, Atlanta, USA (2009)