O. Brian and . Higgins, What is the Difference Between a Public-Key Infrastructure and a Certification Authority?

M. Shirbu and J. Chuang, Distributed Authentication in Kerberos using Public key cryptography

G. Bass-de, Business processes Security

V. Kisimov, Dynamic Business-managed Information systems, 2008.

R. Garfamy, Supplier selection and Business process improvement, doctoral thesis, 2005.
DOI : 10.1504/ijsom.2009.023234

J. Lee and J. Choi, Process selection for Business Process Management in a mobile telecommunications company, University of Illinois at, International Journal of Information Technologies and Management, pp.382-399, 2009.