1. Abadi, M., Burrows, M., Lampson, B., & Plotkin, G. (1993). A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4), 706–734.
2. Anderson, R. (2010). Security engineering: a guide to building dependable distributed systems. New York: Wiley.
3. Austin, J. L. (1962). How to do things with words: the William James lectures delivered at Harvard University in 1955. Oxford: Clarendon. Ed. J.O. Urmson.
4. Baier, A. (1986). Trust and antitrust. Ethics, 96(2), 231–260.
5. Bishop, M. (2003). Computer security: art and science. Reading: Addison Wesley.