1. Internet 2. The shibboleth project. http://shibboleth.internet2.edu/
2. M. Abadi and C. Fournet. Access control based on execution history. Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 107–121, 2003
3. K. Beznosov. Object security attributes: Enabling application-specific access control in middleware. Proceedings of the 4th International Symposium on Distributed Objects & Applications (DOA), 2002
4. Lai C., L. Gong, L. Koved, A. Nadalin, and R. Schemers. User authentication and authorization in the java platform. In Proceedings of the 15th Annual Computer Security Applications Conference, 1999. http://java.sun.com/products/jaas/
5. Causeway: Support for controlling and analyzing the execution of multi-tier applications;Chanda,2005