1. Adam, N. R., Atluri, V., Chun, S. A., Ellenberger, J., Shafiq, B., Vaidya, J., & Xiong, H. (2008). Secure information sharing and analysis for effective emergency management. In Proceedings of the Digital Government Research Conference (pp. 407–408). Digital Government Society of North America.
2. Backes, M., Druschel, P., Haeberlen, A., & Unruh, D. (2009). CSAR: A practical and provable technique to make randomized systems accountable. In Proceedings of the Network and Distributed System Security Symposium, The Internet Society.
3. Brucker, A. D., & Hutter, D. (2010). Information flow in disaster management systems. In Proceedings of the Conference on Availability, Reliability and Security (pp. 156-163), IEEE CS.
4. Brucker, A. D., Petritsch, H., & Weber, S. G. (2010). Attribute-based encryption with break-glass. In Proceedings of the Workshop in Information Security Theory and Practice (pp. 237–244). Springer.
5. Privacy in pervasive computing environments ~ a contradiction in terms?