1. Larrocha ER, Minguet JM, Díaz G, Castro M and Vara A Filling the gap of Information Security Management inside ITIL®: proposals for postgraduate students. IEEE EDUCON Edu. Engg. pp: 907--912, 2010.
2. Sannella, M. J. 1994. Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
3. Sheikhpour, R.M.N. and Modiri, N. Mapping Approach of ITIL Service Management Processes to ISO/IEC 27001 Controls. Journal of Computing, 37, pp. 117--124, 2011.
4. M.Sykes, N.Landman. " ITIL and ISO/IEC 27001- How ITIL can be used to support the delivery of compliant practices for Informaton Security Management Systems" Fox IT Ltd and QT&C Group Ltd, 2010.
5. Rezakhani, A., Hajebi, A. and Mohammadi, N. Standardization of all information security management systems. International Journal of Computer Applications, 18(8), pp. 4--8,2011.