1. Bell DE, LaPadula LJ (1974) Secure Computer Systems: Mathematical Foundations and Models. Mitre Report M74-244, Mitre Corporation, Bedford, Massachusetts
2. Firesmith DG (2003) Engineering Security Requirements. J Object Technology 2: 53-68
3. Firesmith DG (2004) Specifying Reusable Security Requirements. J Object Technology 3: 61-75
4. Garrido JL, Paderewski P, Rodríguez ML, Hornos M, Noguera M (2005) A software architecture intended to design high quality groupware applications. In: Proceedings of the ICSE Research and Practice, pp 59-65
5. Gerber M, von Solms R, Overbeek P (2001) Formalizing information security requirements. J Information Management & Computer Security 9: 32-37