P. R, K. M, M. H, K. Venugopal, and L. Patnaik. International Journal of Innovative Science and Modern Engineering (IJISME), 3 (2):
67-74(January 2015)
M. Brenner, H. Perl, and M. Smith. Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, page 375 -382. (June 2012)
J. Jadav, D. Wandra, and M. Dabhi. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (2):
583--586(February 2015)
E. Mansfield, J. Pevehouse, and D. Bearce. Power and the purse : Economic statecraft, interdependence, and national security, Frank Cass, London and Portland, OR, (2000)
M. Kang, J. Park, and J. Froscher. SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, page 66--74. New York, NY, USA, ACM Press, (2001)
H. Mouratidis, P. Giorgini, and G. Manson. Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (2003)