1. Alexander, I.: Misuse cases help to elicit non-functional requirements. Computing and Control Engineering Journal 14(1), 40–45 (2003)
2. Card, I., Profile, P.: Common Criteria for Information Technology Security Evaluation (2001)
3. Coatrieux, G., Maitre, H., Sankur, B.: Strict integrity control of biomedical images. In: Proceedings of SPIE
4. Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. International Journal of Information Security 7(4), 285–305 (2008)
5. Cuppens, F., Cuppens-Boulahia, N., Miège, A.: Inheritance hierarchies in the Or-BAC model and application in a network environment. In: Second Foundations of Computer Security Workshop (FCS 2004), Turku, Finland (2004)