1. Ahn, G., Sandhu, R., Kang, M., Park, J.: Injecting RBAC to secure a web-based workflow system. In: 5th ACM Workshop on Role-based Access Control, pp. 1–10, Berlin, Germany, ACM Press (2000)
2. Bergstra, J. A., Klop, J. W.: Algebra of communicating processes with abstraction. Theor. Comput. Sci. 37(1), 77–121 (1985)
3. Boella, G., van der Torre, L. W.N. Regulative and constitutive norms in normative multiagent systems. In: 9th International Conference on the Principles of Knowledge Representation and Reasoning (KR’04). pp. 255–266, Whistler, CA, USA (2004)
4. Botha, R. A., Eloff, J. H. P.: Separation of duties for access control enforcement in workflow environments. IBM Syst. J. 40(3), 666–682 (2001)
5. Cabri, G., Ferrari, L., Leonardi, L.: The RoleX environment for multi-agent cooperation. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) Cooperative Information Agents VIII, vol. 3191 of LNCS, 8th International Workshop (CIA 2004), Erfurt, Germany, September 27–29, 2004. pp. 257–270. Springer, Berlin Heidelberg New York (2004) Proceedings.