1. Users are not the enemy: why users compromise security mechanisms and how to take remedial measures;Adams;Communications of the ACM,1999
2. Alfieri, R., Cecchini, R., Ciaschini, V., dell’Agnello, L., Frohner, A., Gianoli, A., Lorentey, K.L., Spataro, F., 2003. VOMS, an authorization system for virtual organizations. First European Across Grids Conference, Santiago de Compostela, 13–14 February 2003, http://grid-auth.infn.it/docs/VOMS-Santiago.pdf
3. In search of usable security: five lessons from the field;Balfanz;IEEE Security & Privacy,2004
4. Basney, J., Humphrey, M., Welch, V., 1995. The MyProxy online credential repository. Software: Practice and Experience, http://www.ncsa.uiuc.edu/~jbasney/myproxy-spe.pdf
5. Beckles, B., 2004. Removing digital certificates from the end-user's experience of grid environments. Proceedings of the UK e-Science All Hands Meeting 2004, http://www.allhands.org.uk/2004/proceedings/papers/250.pdf