1. Securing context-aware applications using environment roles
2. Implementing access control to people location information
3. A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications
4. Georg, G., Bieman, J., and France, R.B.: ‘Using Alloy and UML/OCL to specify run-time configuration management: a case study’, Evans, A., France, R., Moreira, A., Rumpe, B., Practical UML-based rigorous development methods – countering or integrating the eXtremists, 2001),(LNI, P-7) p. 128–141