1. Control-flow Integrity;Abadi,2005
2. Structure and interpretation of computer programs;Abelson,1996
3. Checking threat modeling data flow diagrams for implementation conformance and security;Abi-Antoun,2007
4. A comparison of two privacy policy languages: EPAL and XACML;Anderson;Technical report,2005