1. Definition of Risk Management: ISACA.
http://www.isaca.org/Pages/Glossary.aspx?tid=774&char=R
2. ISO/IEC 27005:2011.
http://www.iso.org/iso/catalogue_detail?csnumber=56742
3. The NIST SP800-30: Guide for Conducting Risk Assessments; by the NIST Computer Security Division (CSD); Draft version (Revision 1), September 2011, File Name: SP800-30-Rev1-ipd.pdf: Pages.: Appendix B, pg. B-8; Chapter 1, pg. 1; Pg vii; Chapter 2, pg. 7 to 13; Figure 5—Risk Assessment Process on pg. 19 (
http://csrc.nist.gov/publications/drafts/800-30-rev1/SP800-30-Rev1-ipd.pdf
)
4. Almuatiri, A, Siewe, F.: CA-UCON: a context-aware usage control model. In: 5th ACM International Workshop on Context-Awareness for Self-Managing Systems, pp. 38–34, CASEMANS ’11 (2011)
5. Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128–174 (2004)