P. Burnap and J. Hilton, Self Protecting Data for De-perimeterised Information Sharing, 2009 Third International Conference on Digital Society, 2009.
DOI : 10.1109/ICDS.2009.41

P. Burnap and J. Hilton, Anas Tawileh, Self-Protecting Information for Deperimeterised Electronic Relationships (SPIDER), Final Report, 2009.

A. Van and C. , Roel Wieringa _, De-perimeterisation as a cycle: tearing down and rebuilding security perimeters, 2008.

T. Olovsson and . Cto, The Road to Jericho and the myth of Fortress Applications, 2007.

T. Olovsson, Surviving in a hostile world The myth of fortress applications, 2007.

G. Palmer, De-Perimeterisation: Benefits and limitations, Network and Security, Siebel Systems Ltd., Siebel Centre, The Glanty, 2005.
DOI : 10.1016/j.istr.2005.09.001

P. Simmonds, Architectures for a Jericho Environment, Global Information Security Director , ICI Information Security, 2004.

E. Damiana, S. De-cabitani, D. Vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002.
DOI : 10.1145/505586.505590

E. Bertino and S. Castano, On specifying security policies for web documents with an XML-based language, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, 2001.
DOI : 10.1145/373256.373264

I. Recommendation and X. , 509, ISO/IEC 9594-8, Information Technology ? Open Systems Interconnection-The Directory: Authentication Framework, Edition, 1997.