4David A. Steven Akridge, How Can Security Be Measured, Information Systems Audit and Control Association, 2005.
5Ali M. A1-Khouri, Optimizing Identity and Access Management (IAM) Frameworks, International Journal of Engineering Research and Applications (IJERA),Vol. 1, Issue 3, pp. 461-477Caroline R. Hamilton.Risk Management and Security Information Systems Security, 1999,8(2):69-78.