M. Cakiroglu, and A. Özcerit. Proceedings of the 3rd international conference on Scalable information systems, page 4:1--4:8. ICST, Brussels, Belgium, Belgium, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), (2008)
M. Schäfer, V. Lenders, and I. Martinovic. Applied Cryptography and Network Security, volume 7954 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
C. Kloukinas, and G. Spanoudakis. Trust, Privacy and Security in Digital Business, volume 4657 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2007)
J. Moskal, and C. Matheus. Rule Representation, Interchange and Reasoning on the Web, volume 5321 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2008)
J. Hähner, S. Rudolph, S. Tomforde, D. Fisch, B. Sick, N. Kopal, and A. Wacker. 1st International Workshop on „Self-optimisation in organic and autonomic computing systems“ (SAOS13), held in conjunction with 26th International Conference on Architecture of Computing Systems (ARCS 2013), Prague, Czech Republic, (19-22 Februar 2013)
M. Harbach, S. Fahl, P. Yakovleva, and M. Smith. Proceedings of the 2013 International Conference on Financial Cryptography and Data Security (FC13), Workshop on Usable Security, (2013)
B. Henne, C. Szongott, and M. Smith. Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, page 95--106. New York, NY, USA, ACM, (April 2013)