[1] Ngo, L. and Apon, A. (2007) Using Shibboleth for Authorization and Authentication to the Subversion Version Control Repository System. IEEE Computer Society.
[2] Ghauri, P., Gronhaug, K. and Kristianslund, I. (1995) Research Methods in Business Studies: A Practical Guide. Hemel Hempstead, Prentice Hall.
[3] Scavo, T. and Cantor, S. (2005) Shibboleth Architecture Technical Overview: Working Draft 02.
[4] UK Federation Information Centre, Documents, How It Works Browse.
http://www.ukfederation.org.uk/content/Documents/HowItWorks
[5] Rixon, G. (2005) Reviews of Shibboleth.
[6] Cary, A. A Discussion of Current Methods and a Vision for Digital Libraries.
http://www.webjunction.org/documents/webjunction/
Authentication_and_Authorization.html
[7] O’Neil, M. (2003) Web Service Security. McGraw-Hill, Osborne.
[8] Pollock, N. and Cornford, J. (2000) Theory and Practice of the Virtual University: Report on UK Universities Use of New Technologies. ARIADNE, No. 24.
http://www.ariadne.ac.uk/issue24/virtual-universities/
[9] CVE-2011-1411. http://www.cvedetails.com/cve/CVE-2011-1411/
[10] Bidgoli, M. (2009) Handbook of Information Security. John Wiley & Sons Inc.
[11] TechRepublic (2003) Administor’s Guide to Active Directory. 2nd Edition, TechRepublic, KY.
[12] Aldini, A., Barteh, G. and Gorrieri, R. (2009) Foundation of Security Analysis and Design V. Springer, Germany.
[13] Shibboleth Installation.
https://wiki.shibboleth.net/confluence/display/SHIB2/Installation
[14] UK Access Management Federation.
http://www.ukfederation.org.uk/content/Documents/Setup2SP
[15] LDAP Authentication/Smartcard.
http://www.mediawiki.org/wiki/Extension:LDAP_Authentication/Smartcard_
Configuration_Examples