1. M. Abadi, A. Birrel, R. Stata and E. Wobber, Secure Web tunneling, in: Proc. 7th World Wide Web Conference, April 1998, pp. 531–539, http://www7.scu.edu.au/programme/fullpapers/1859/com1859.htm
2. J.F. Barkley, A.V. Cincotta, D.F. Ferraiolo, S. Gavrilla and D.R. Kuhn, Role based access control for the World Wide Web, Technical Report, NIST, April 1997, http://hissa.ncsl.nist.gov/rbac/rbacweb/paper.ps
3. J.F. Barkley, D.R. Kuhn, L.S. Rosenthal, M.W. Skall and A.V. Cincotta, Role based access control for the Web, Technical Report, NIST, April 1998, http://hissa.ncsl.nist.gov/rbac/cals-paper.html
4. T. Berners-Lee, WWW: past, present and future, Computer 37 (8) (1996) 69–77.
5. ECMA, Security in: open systems: data elements and service definitions, Standard ECMA-138, ECMA, December 1989.