1. Bagchi, S., Kar, G., Hellerstein, J.: Dependency analysis in distributed systems using fault injection: application to problem determination in an e-commerce environment. In: DSOM ’01: Proceedings of 2001 International Workshop on Distributed Systems: Operations & Management. http://www.research.ibm.com/PM/DSOM2001_dependency_final.pdf (2001)
2. Baiardi F., Suin S., Telmon C., Pioli M.: Assessing the risk of an information infrastructure through security dependencies. Crit. Inf. Infrastruct. Secur. 4347, 42–54 (2006)
3. Bennet, S.P., Kailay, M.P.: An application of qualitative risk analysis to computer security for the commercial sector. In: Eighth Annual Computer Security Applications Conference, pp. 64–73. IEEE Computer Society Press. http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=5913&arnumber=228232&count=25&index=15 , April 1992
4. Brown, A., Kar, G., Keller, A.: An active approach to characterizing dynamic dependencies for problem determination in a distributed application environment. In: IM ’01: IEEE/IFIP International Symposium on Integrated Network Management, pp. 377–390 (2001)
5. BS 7799-3: Information Security Management Systems. Part 3: Guidelines for Information Security Risk Management (2006)