1. Abadi, M., Fournet, C.: Access control based on execution history. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium. San Diego (2003)
2. Arnold K., Gosling J. and Holmes D. (2000). The Java Programming Language, 3rd edn. Addison Wesley, Reading
3. Bandmann, O., Dam, M., Firozabadi, B.S.: Constrained delegation. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 131–140, Berkeley, (2002)
4. Bauer L., Appel A.W. and Felten E.W. (2003). Mechanisms for secure modular programming in Java. Softw. Pract. Exp. 33(5): 461–480
5. Boebert, W.E.: On the inability of an unmodified capability machine to enforce the *-property. In: Proceedings of the 7th DoD/NBS Computer Security Conference pp. 291–293, Gaithersburg (1984). http://zesty.ca/capmyths/boebert.html