1. Arnold, K. und J. Gosling: The Java Programming Language. Addison-Wesley, Reading, MA, USA, 1998.
2. Carey, M. J., D. J. DeWitt, M. J. Franklin, N. E. Hall, M. L. Mcauliffe, J. F. Naughton, D. T. Schuh, M. H. Solomon, C. K. Tan, O. G. Tsatalos, S. J. White und M. J. Zwilling: Shoring Up Persistent Applications. In: Proc. of the ACM SIGMOD Conf. on Management of Data, Seiten 383–394, Minneapolis, MI, USA, Mai 1994.
3. Castano, S., M. G. Fugini, G. Martella und P. Samarati: Database Security. ACM Press. Addison-Wesley, Reading, MA, USA, 1995.
4. Fernandez, E. B., R. C. Summers und C. Wood: Database Security and Integrity. Addison-Wesley, 1981.
5. Ferraiolo, David F. und Richard Kuhn: Role-Based Access Control. 15th NIST-NCSC National Computer Security Conference, Seiten 554–563, Oktober 1992.