1. Mobile Ad Hoc Networking;Basagni,2004
2. Soft Constraints for Security;Bella;ENTCS,2006
3. Blaze, M., J. Feigenbaum and J. Lacy, Decentralized Trust Management, in: IEEE Symposium on Security and Privacy, 1996, pp. 164–173
4. Camara, J., C. Canal and J. Cubo, Issues in the formalization of web service orchestration, in: WCAT, Tech. Rep. TR ITI-05-07. Dept. of Computer Science. School of Informatics, Malaga University, 2005, pp. 17–24
5. Classification of Security Properties—Part II: Network Security;Focardi,2004