H. Mouratidis, P. Giorgini, and G. Manson. Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (2003)
M. Kang, J. Park, and J. Froscher. SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, page 66--74. New York, NY, USA, ACM Press, (2001)
E. Mansfield, J. Pevehouse, and D. Bearce. Power and the purse : Economic statecraft, interdependence, and national security, Frank Cass, London and Portland, OR, (2000)
J. Jadav, D. Wandra, and M. Dabhi. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (2):
583--586(February 2015)
M. Brenner, H. Perl, and M. Smith. Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, page 375 -382. (June 2012)
P. R, K. M, M. H, K. Venugopal, and L. Patnaik. International Journal of Innovative Science and Modern Engineering (IJISME), 3 (2):
67-74(January 2015)