1. EDP auditing: conceptual foundations and practice;Weber,1988
2. Information processing systems — Open Systems Interconnection — basic reference model — Part 2: security architecture,1989
3. Privacy constraint processing in a privacy enhanced database management system;Thuraisingham;Data and Knowledge Engineering Journal,2005
4. Assuring data privacy compliance;Kenny;Information Systems Control Journal,2004
5. Information technologies — security techniques — code of practice for information security management,2005