1. Abie, H., Aredo, D.B., Kristoffersen, T., Mazaher, S., Raguin, T., 2004. Integrating a security requirement language with UML. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, S.J. (Eds.), UML 2004 – The Unified Modeling Language. Model Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11–15, 2004, Proceedings, vol. 3273 of LNCS, Springer, pp. 350–364.
2. Transaction security system;Abraham;IBM Systems Journal,1991
3. Alexander, I.F., 2002. Initial industrial experience of misuse cases in trade-off analysis. In: 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 9–13 September 2002, Essen, Germany, IEEE Computer Society, pp. 61–70.
4. Security Engineering – A Guide to Building Dependable Distributed Systems;Anderson,2001
5. AusCERT, 2006. Australian Computer Crime and Security Survey, (Australian Computer Emergency Response Team). URL http://www.auscert.org.au/images/ACCSS2006.pdf.