1. Security protocols and their properties;Abadi,2000
2. A calculus for cryptographic protocols: The spi calculus;Abadi;Information and Computation,1999
3. Transport layer security: How much does it really cost?;Apostolopoulos,1999
4. Model driven security for process-oriented systems;Basin,2003
5. Actor-centric modeling of user rights;Breu,2004