1. Anlauff, M., Pavlovic, D., Smith, D.R.: Composition and refinement of evolving specifications. In: Proceedings of Workshop on Evolutionary Formal Software Development (2002)
2. Appel, A.W., Felten, E.W.: Proof-carrying authentication. In: 6th ACM Conference on Computer and Communications Security (1999)
3. Balze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Conference on Security and Privacy (1996)
4. Barnett, M., Schulte, W.: Spying on components: A runtime verification technique. In: Workshop on Specification and Verification of Component-Based Systems (2001)
5. Lecture Notes in Computer Science;H. Barringer,2004