1. Llewellyn-Jones, D., Merabti, M., Shi, Q., Askwith, B. (2004). “Utilising Component Composition for Secure ubiquitous Computing”. Proceedings of 2nd UKUbiNet Workshop.
2. Mantel, H., (2002). “On the composition of secure systems”. Proc. of IEEE Symposium on Security and Privacy.
3. Shi, Q., Zhang, N., (1998). “An effective model for composition of secure systems,” Journalof-Systems-and-Software, 43(3). 233–44.
4. BEA White Paper. “BEA WebLogic Security Framework: Working with Your Security Eco-System”. http://www.bea.com
5. Object Management Group. “The Common Object Request Broker: Architecture and Specification.” http://www.omg.org