1. [1] A. Kemper, P.C. Lockeman, G. Moerkotte, and H.D. Walter, “Autonomous objects: A natural model for complex applications,” J. Intelligent Information Systems, vol.3, no.2, pp.133-150, 1994.
2. [2] N. Krivokapic, S. Grieser, M. Islinger, M. Keidl, S. Prols, S. Seeltzam, and A. Kemper, “AutO: A distributed system of autonomous objects,” Technical Report, University Passau, Germany, 1996.
3. [3] E. Gudes and A. Tubman, “AutoWF-A secure Web workflow system using autonomous objects,” Data & Knowledge Engineering, vol.43, no.1, pp.1-27, 2002.
4. [4] S.N. Novikov and A.A. Kiselev, “The authentication of the user from the remote autonomous object,” 4th Siberian Russian Workshop and Tutorial on Electron Devices and Materials EDM, Section II, NSTU, Altai, Erlagol, July 2003.
5. A method for obtaining digital signatures and public-key cryptosystems