1. Atluri V, Huang W (1996) An authorization model for workflows. In: Computer security—ESORICS 96, 4th European symposium on research in computer security, Rome, Italy, 25–27 September, 1996, Proceedings, pp 44–64. https://doi.org/10.1007/3-540-61770-1_27
2. Atluri V, Huang W (2000) A petri net based safety analysis of workflow authorization models. J Comput Secur 8(2/3):209–240. http://content.iospress.com/articles/journal-of-computer-security/jcs113
3. Choudhury O, Rudolph N, Sylla I, Fairoza N, Das (2018) A Auto-generation of smart contracts from domain-specific ontologies and semantic rules. In: IEEE Blockchain Conference, vol 2018
4. Delmolino K, Arnett M, Kosba AE, Miller A, Shi E (2015) Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. IACR Cryptology ePrint Archive, vol 2015, p 460. https://eprint.iacr.org/2015/460.pdf
5. Dhillon V, Metcalf D, Hooper M (2017) The DAO hacked. Apress, Berkeley, pp 67–78. https://doi.org/10.1007/978-1-4842-3081-7_6