1. Lampson, B.W.: Usable security: how to get it. Commun. ACM 52, 25–27 (2009)
2. Schneider, F.B.: Blueprint for a science of cybersecurity. Next Wave 19(2), 47–57 (2012)
3. Rushby, J.: The design and verification of secure systems. In: 8th ACM Symposium on Operating System Principles, Asilomar, CA, pp. 12–21, December 1981. (ACM Operating Systems Review, Vol. 15, No. 5)
4. Rushby, J.: Separation and integration in MILS (The MILS Constitution). Technical report SRI-CSL-08-XX, February 2008
5. System and Network Analysis Center, Information Assurance Directorate, Separation Kernels on Commodity Workstations, NSA, 10 March 2010.
https://www.niap-ccevs.org/announcements/Separation%20Kernels%20on%20Commodity%20Workstations.pdf