1. Logic in access control;Abadi,2003
2. M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: POPL, 2001, pp. 104–115.
3. M. Abadi, C. Fournet, Access control based on execution history, in: 10th Annual Network and Distributed System Security Symposium (NDSS’03), The Internet Society, 2003.
4. Cryptographically sound implementations for communicating processes;Adão,2006
5. JavaSpaces Principles, Patterns and Practice;Arnold,1999