R. Sandhu, D. Ferraiolo, and R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000.
DOI : 10.1145/344287.344301

C. Wang, A. Carzaniga, D. Evans, A. L. Wolf, and E. L. Wolf, Security issues and requirements for internet-scale publish-subscribe systems, 35th Hawaii International Conference on System Sciences (HICSS-35), 2002.

A. Belokosztolszki, D. M. Eyers, P. R. Pietzuch, J. Bacon, and K. Moody, Role-based access control for publish/subscribe middleware architectures, Proceedings of the 2nd international workshop on Distributed event-based systems , DEBS '03, pp.1-8, 2003.
DOI : 10.1145/966618.966622

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.27

L. Fiege, A. Zeidler, A. Buchmann, R. Kilian-kehr, G. Mühl et al., Security aspects in publish/subscribe systems, "International Workshop on Distributed Event-based Systems (DEBS 2004)" W18L Workshop, 26th International Conference on Software Engineering, 2004.
DOI : 10.1049/ic:20040381

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.4998

A. Fongen, Architecture patterns for a ubiquitous identity management system, ICONS 2011, 2011.

A. Fongen, Identity Management without Revocation, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010.
DOI : 10.1109/SECURWARE.2010.20

A. M. Hegland, E. Winjum, and O. E. Hedenstad, A framework for authentication in NBD tactical Ad Hoc networks, IEEE Communications Magazine, vol.49, issue.10, pp.64-71, 2011.
DOI : 10.1109/MCOM.2011.6035819

A. Leicher, N. Kuntze, and A. U. Schmidt, Implementation of a Trusted Ticket System, pp.152-163, 2009.
DOI : 10.1007/978-3-642-01244-0_14

A. Leicher, A. Schmidt, Y. Shah, and I. Cha, Trusted Computing enhanced OpenID, 2010 International Conference for. (nov, pp.1-8, 2010.
DOI : 10.1504/ijitst.2011.043133

A. Nagarajan, V. Varadharajan, M. Hitchens, and E. Gallery, Property Based Attestation and Trusted Computing: Analysis and Challenges, 2009 Third International Conference on Network and System Security, pp.278-285, 2009.
DOI : 10.1109/NSS.2009.83

D. Grawrock, The Intel Safer Computing Initiative: Building Blocks for Trusted Computing. Engineer to Engineer Series, 2006.

J. M. Mccun, Reducing the Trusted Computing Base for Applications on Commodity Systems, 2009.