E. Hermann, The Limes Security Model for Information Flow Control, accepted at FARES Workshop of the Sixth International Conference on Availability, Reliability and Security, 2011.

D. F. Brewer and M. J. Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989.
DOI : 10.1109/SECPRI.1989.36295

T. Y. Lin, Chinese wall security policy-an aggressive model, [1989 Proceedings] Fifth Annual Computer Security Applications Conference, pp.286-293, 1989.
DOI : 10.1109/CSAC.1989.81064

D. Bell and L. Lapadula, Secure Computer Systems: Mathematical Foundations, MITRE Corporation, 1973.

D. Clark and D. Wilson, A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-194, 1987.
DOI : 10.1109/SP.1987.10001

M. Loock and J. Eloff, A new Access Control model based on the Chinese Wall Security Policy Model, Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp.1-10, 2005.

S. Burbeck, The Tao of E-Business Services, IBM developerWorks, 2000.

J. W. Pratt and R. J. Zeckhausen, Principals and Agents: The Structure of Business, 1985.

A. Ricci, . Buda, . Claudio, and N. Zaghini, An Agent-Oriented Programming Model for SOA & Web Services, 2007 5th IEEE International Conference on Industrial Informatics, 2007.
DOI : 10.1109/INDIN.2007.4384922

Y. Hsiao and G. Hwang, Implementing the Chinese Wall Security Model in Workflow Management Systems, International Symposium on Parallel and Distributed Processing with Applications, pp.574-581, 2010.
DOI : 10.1109/ISPA.2010.41

C. K. Patrick, G. Hung, and . Qiu, Implementing Conflict of Interest Assertions for Web Services Matchmaking Process, IEEE International Conference on E-Commerce Technology (CEC'03), 2003.

J. Debasish and . Bihari-bhaumik-bijan, Security Model of Service Oriented Computational Grids, Annual IEEE, pp.15-17, 2006.

R. Wu, G. Ahn, H. Hu, and M. Singhal, Information flow control in cloud computing, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, 2010.
DOI : 10.4108/icst.trustcol.2010.1