1. A Hovav, R Berger, Tutorial: identity management systems and secured access control. Commun. Assoc. Inf. Syst.25(1), 42 (2009).
2. A Cleven, R Winter, in Enterprise Business-Process and Information Systems Modeling. Lecture Notes in Business Information Processing, ed. by T Halpin, J Krogstie, S Nurcan, E Proper, R Schmidt, P Soffer, and R Ukor. Regulatory Compliance in Information Systems Research – Literature Analysis and Research Agenda, vol. 29 (SpringerBerlin Heidelberg, 2009), pp. 174–186.
3. United States Code, Sarbanes-Oxley Act of 2002, PL 107-204, 116 Stat 745 (2002). https://www.sec.gov/about/laws/soa2002.pdf . Accessed 11 Aug 2016.
4. Basel Committee on Banking Supervision, Basel III - A global regulatory framework for more resilient banks and banking systems (2011). https://www.bis.org/publ/bcbs189.pdf . Accessed 11 Aug 2016.
5. L Fuchs, G Pernul, in The Second International Conference on Availability, Reliability and Security, 2007: ARES 2007. Supporting compliant and secure user handling—a structured approach for in-house identity management (IEEE Computer SocietyLos Alamitos, 2007), pp. 374–384.