1. Ahmad, A., & Ruighavar, A. (2003). Improved Event Logging for security and Forensics: developing audit management infrastructure requirements. Paper presented at the Security Conference.
2. A Theory of Computer Semiotics: Semiotic Approaches to Construction and Assessment of Computer Systems.;P.Anderson;Computational Linguistics,1990
3. Backhouse, J. (2000). Searching for Meaning – Performatives and Obligations in Public Key Infrastructures. Paper presented at the International Workshop on the Language-Action Perspective on Communication Modelling.
4. Structures of responsibility and security of information systems