1. Brændeland, G. and K. Stølen, Using model-based security analysis in component-oriented system development, in: Proceedings of Quality of Protection (QoP) (2006), pp. 11–18
2. A logic of authentication;Burrows;ACM Transactions on Computer Systems,1990
3. Experiences from using the CORAS methodology to analyze a web application;den Braber;Journal of Cases in Information Technology,2005
4. Can we trust trust?;Gambetta,1988
5. Requirements engineering meets trust management: Model, methodology, and reasoning;Giorgini,2004