1. Baader F, Diego Calvanese DM, Nardi D, Patel-Schneider P (2003) The description logic handbook. Cambridge University Press, London
2. Basin D, Clavel M, Doser J, Egea M (2009) Automated analysis of security-design models. Inf Softw Technol 51(5): 815–831. doi: 10.1016/j.infsof.2008.05.011
3. Basin DA, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1):39–91 http://doi.acm.org/10.1145/1125808.1125810
4. Berardi D, Calvanese D, Giacomo GD (2005) Reasoning on UML class diagrams. Artificial Intelligence 168: 70–118. doi: 10.1016/j.artint.2005.05.003
5. Braga C (2008) From access control policies to aspect code: a metamodel-based approach. In: Chaudron MRV (eds) Proceedings of the 11th international conference on model driven engineering languages and systems (MODELS 2008). Workshops and Symposia at MODELS 2008, 28 Sept–3 Oct 2008, Toulouse, France. Lecture notes on computer science, vol 5421. Springer, Berlin, pp 243–256. doi: 10.1007/978-3-642-01648-6_26