1. C2C-CC Manifesto. (2007). Report of the CAR 2 CAR Communication Consortium. Retrieved June 12, 2011, from http://www.car-to-car.org
2. Adams, M., ter Hofstede, H. M. A., Edmond, D., & van der Aalst, W. M. P. (2006). Implementing dynamic flexibility in workflows using worklets. Technical Report BPM-06-06. BPM Center.
3. Agarwal, A., Miller, J., Eastep, J., Wentziaff, D., & Kasture, H. (2010). Self-aware computing. Retrieved July 11, 2011, from http://www.defensetechbriefs.com/component/content/article/8259
4. Amir, E., Anderson, M. L., & Chaudhri, C. K. (2004). Report on DARPA Workshop on Self-Aware Computer Systems. Retrieved August 18, 2011, from http://citeseerx.ist.psu.edu (document 10.1.1.120.6684.pdf)
5. Leveraging access control for privacy protection: A survey;A.Antonakopoulou;Privacy protection measures and technologies in business organizations: Aspects and standards,2012