1. M.A. Sasse, Computer security: anatomy of a usability disaster, and a plan for recovery, in: Workshop on Human–Computer Interaction and Security Systems, CHI 2003, Fort Lauderdale, 2003.
2. A.J. DeWitt, J. Kuljis, Aligning usability and security—a usability study of polaris, in: Proceedings of the Symposium on Usable Privacy and Security, 2006.
3. Good-enough security: toward a pragmatic business-driven discipline;Sandhu;IEEE Internet Computing,2003
4. S.H. Houmb, F.D. Braber, M.S. Lund, K. Stølen, Towards a UML profile for model-based risk assessment, in: Proceedings of the UML’2002 Satellite Workshop on Critical Systems Development with UML, 2002, pp. 79–91.
5. Security attribute evaluation method: a cost-benefit approach;Butler,2002