1. M. Abadi. Security protocols and their properties. In F. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation. IOS Press, 2000.
2. M. Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706–734, 1993.
3. R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2001.
4. B. Bokowski and J. Vitek. Confined types. In 14th Annual ACM SIGPLAN Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA’ 99), 1999.
5. R. Campo, A. Cavarra, and E. Riccobene. Simulating UML state machines. In E. Borger and U. Glässer, editors, ASM’2001, LNCS. Springer-Verlag, 2001. To be published.