1. Coulouns, G.; Dollimore, J.: Re-quirements for security in cooperative work: two case studies. Technical Report 671, Department of Computer Science, Queen Mary and Westfield College, University of London, 1994 (http://www.dcs.qmw.ac.uk/research/distrib/).
2. Coulouns, G.; Dollimore, J.: Protection of shared objects for cooperative work. Technical Report 703, Department of Computer Science, Queen Mary and Westfield College, University of London, 1995 (http://www.dcs.qmw.ac.uk/research/distrib/).
3. Cremers, A. B.; Kahler, H.; Pfeifer, A.; Stiemerling, O.; Wulf, V.: PoliTeam — Kokons-truktive und evolutionäre Entwicklung einer Groupware. In: Informatik Spektrum, Vol. 21, 1998, S. 194–202.
4. Rannenberg, K.; Pfitzmann, A.; Müller, G.: Sicherheit, insbesondere mehrseitige IT-Sicherheit. In: Pfitzmann, G.; Müller, A. (Hrsg.): Mehrseitige Sicherheit in der Kommunikationstechnik. Addison-Wesley-Longman, Bonn 1997, S. 21–29.
5. Voydock, V. L.; Kent, S. T.: Security Mechanisms in High-Level Network Protocols. In: ACM Computing Surveys, Vol. 15, No. 2, 1983, S. 135–170.