1. Dehne, F., R.P. van de Riet: A Guided Tour through Mokum 2.0, IR-368, Faculteit Wiskunde en Informatica, VU, October 1994.
2. Gendler-Fishman, Masha, Ehud Gudes: Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databases, in: T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 88–10
3. Gudes, Ehud, Reind van de Riet, Hans Burg, Martin Olivier: Alter-egos and Roles Supporting WorkFlow Security in Cyberspace, in:T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 152–166.
4. Hale, John, Jody Threet, Sujeet Shenoi: Capability-Based Primitives for Access Control in Object-Oriented Systems, in: T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 88–103.
5. Olivier, M.S. E. Gudes, R.P. van de Riet, J.F.M. Burg: Specifying Application-lev el Security in Workflow Systems in: R. Wagner (Ed). Database and Expert Systems Applications, IEEE Computer Society, 1998, pp. 346–354.