1. Abadi, M., Fournet, C.: Access control based on execution history. In: Network & Distributed System Security Symp., pp. 107–121 (2003)
2. Lecture Notes in Computer Science;A. Banerjee,2005
3. Lecture Notes in Computer Science;M. Bartoletti,2004
4. Bartoletti, M., Degano, P., Ferrari, G.L.: Enforcing secure service composition. In: IEEE 18th CSFW, pp. 211–223 (2005)
5. Brewer, D.F.C., Nash, M.J.: The Chinese wall security policy. IEEE Security & Privacy, pp. 206–214 (1989)