1. Sarbanes-Oxley Act of 2002. (2002, January). One Hundred Seventh Congress of the United States of America. Retrieved from http: news.findlaw.com hdocs docs gwbush sarbanesoxley072302.pdf
2. Schneier, B. (1999, December). Attack trees. Dr. Dobb s Journal, 21–29.
3. Schumacher, M. (2003). Security engineering with patterns. PhD Thesis, Lecture Notes in Computer Science. LNCS 2754. Springer-Verlag.
4. Schumacher, M., & Roedig, U. (2001). Security engineering with patterns. Proceedings of the PLoP 2001 Conference.
5. Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., & Sommerlad, P. (2006). Security patterns. John Wiley & Sons.
6. Sorgente, T., & Fernandez, E.B. (2004). Analysis patterns for patient treatment. Proceedings of PLoP 2004. Retrieved from http: jerry.cs.uiuc.cs.uiuc. edu ~plop plop2004 accepted_submissions