1. Anderson, J.: Computer Security technology planning study. Technical report, Deputy for Command and Management System, USA (1972)
2. Lecture Notes in Computer Science;G Barthe,2014
3. Lecture Notes in Computer Science;E-I Bartzia,2014
4. Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical report MTR-2547, vol. 1, MITRE Corp., Bedford, MA (1973)
5. Bertot, Y., Castéran, P., (informaticien) Huet, G., Paulin-Mohring, C.: Interactive theorem proving and program development: Coq’Art : the calculus of inductive constructions. Texts in theoretical computer science. Springer, Berlin, New York (2004). Données complémentaires http://coq.inria.fr