1. Paranoid Operating System Methodology for Anonymous & Secure Web Browsing;Castro;Atas da Conferência da Assoc. Port. Sist. Informação,2017
2. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications;Al-Fuqaha;IEEE Commun. Surv. Tutorials,2015
3. "OWASP Top 10: 2021." https://owasp.org/Top10/(accessed Oct. 25, 2021).
4. Security in Microservices Architectures;Mateus-Coelho;Procedia Comput. Sci.,2021
5. D. Ferraiolo, D. Kuhn, and R. Chandramouli, "Role-based access control," pp. 554–563, 2003, Accessed: Nov. 21, 2021. [Online]. Available: https://books.google.com/books?hl=pt-PT&lr=&id=48AeIhQLWckC&oi=fnd&pg=PR15&dq=Broken+Access+Control&ots=LNTLGBtXB5&sig=Gv3Zt3HQ6rXNQvYd_4VKCOvhJFM.