1. Bauer, L., J. Ligatti and D. Walker, A language and system for composing security policies, Technical Report TR-681-03, Princeton University (2004)
2. Memory-efficient algorithms for the verification of temporal properties;Courcoubetis;Form. Methods Syst. Des.,1992
3. Dragoni, N., F. Massacci, K. Naliuka and I. Siahaan, Security-by-contract: Toward a semantics for digital signatures on mobile code, in: European PKI Workshop: Theory and Practice (to appear), 2007
4. Erlingsson, U., “The inlined reference monitor approach to security policy enforcement,” Ph.D. thesis, Dep. of Computer Science, Cornell University (2004)