1. G.J. Ahn, M.E. Shin, Role-based authorization constraints specification using object constraint language, in: WETICE’01: Proceedings of the 10th IEEE International Workshops on Enabling Technologies, IEEE Computer Society, Washington, DC, USA, 2001.
2. D. Basin, M. Clavel, J. Doser, M. Egea, A metamodel-based approach for analyzing security-design models, in: Proceedings of the 10th International Conference on Model Driven Engineering Languages and Systems (MODELS 2007), Lecture Notes in Computer Science, vol. 4735, Springer-Verlag, 2007.
3. D. Basin, J. Doser, T. Lodderstedt, Model driven security for process-oriented systems, in: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT 2003), ACM Press, 2003.
4. Model driven security: from UML models to access control infrastructures;Basin;ACM Transactions on Software Engineering and Methodology,2006
5. R.J. Boulton, A. Gordon, M.J.C. Gordon, J. Harrison, J. Herbert, J.V. Tassel, Experience with embedding hardware description languages in HOL, in: Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design, North-Holland, 1992.