1. [1] C. Artelsmair and R. Wagner, “Towards a security engineering process,” 7th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, 2003.
2. [2] D. Basin, J. Doser, and T. Lodderstedt, “Model driven security for process-oriented systems,” ACM Symposium on Access Control Models and Technologies, ACM Press, Como, Italy, 2003.
3. [3] L. Bass, F. Bachmann, R.J. Ellison, A.P. Moore, and M. Klein, “Security and survivability reasoning frameworks and architectural design tactics,” SEI, 2004.
4. [4] P.G. Bradford, B.M. Grizzell, G.T. Jay, and J.T. Jenkins, “Pragmatic security for constrained wireless networks,” in Security in Distributed, Grid, Mobile, and Pervasive Computing, Capter 4, p.440, Auerbach Publications, 2007.
5. [5] R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, V. Lotz, and G. Wimmel, “Key issues of a formally based process model for security engineering,” International Conference on Software and Systems Engineering and their Applications, 2003.