1. Anderson, A., (ed.): Core and Hierarchical Role Based Access Control (RBAC) profile of XACML, Version 2.0. OASIS XACML-TC, Committee Draft 01 (September 2004)
2. Bandmann, O., Dam, M., Sadighi-Firozabadi, B.: Constrained delegation. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 131–140. IEEE Computer Society Press, Los Alamitos (2002)
3. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust Management System. RFC 2704, IETF (September 1999)
4. Bradshaw, J.M., Dutfield, S., Benoit, P., Woolley, J.D.: KAoS: Toward an industrial-strength open agent architecture. Software Agents (1997)
5. Cartrysse, K., van der Lubbe, J.C.A.: Privacy in mobile agents. In: First IEEE Symposium on Multi-Agent Security and Survivability (2004)