1. Attalah, M. (2000). Security issues in collaborative computing. In D. Chen & D. Lee (Eds.), Computing and combinatorics. (LNCS 4112, 2). Springer.
2. NSF Award #0611053 to Serebrum. (2006). BrainStorm-collaborative customer requirements elicitation for distributed software development.
3. Barka, E., & Sandhu, R. (2000). Framework for role-based delegation models. In Proceedings of the 16th Annual Computer Security Applications Conference (pp. 168-176). IEEE Computer Society
4. Bell, D., & La Padula, L. (1975). Secure computer systems: Mathematical foundations model. (Tech. Rep. M74-244). Bedford, MA: The Mitre Corporation.
5. Berhe, S., Demurjian, S., Ren, H., Devineni, R., Vegad, S., & Polineni, K. (n.d.). Axon–an adaptive collaborative Web portal. In Proceedings of 3rd International Workshop on Adaptation and Evolution in Web Systems Engineering. Retrieved from http://icwe2008.webengineering.org/Program/Workshops/