1. Bishop, M., S. Engle, S. Peisert, S. Whalen, and C. Gates, Case Studies of an Insider Framework, Proc. of Hawaii International Conference on System Sciences, pp. 1–10, IEEE Computer Society Press, 2009.
2. Bishop, M., D. Gollmann, J. Hunker, and C. W. Probst, Countering Insider Threats, Dagstuhl Seminar 08302, Leibnitz Center for Informatics, 18 pp., Dagstuhl Seminar Proceedings, ISSN 1862–4405, July 2008.
3. Bishop, M., Panel: The Insider Problem Revisited, Proc. of NSPW 2005, ACM Press, 2006.
4. Brackney, R., and R. Anderson, Understanding the Insider Threat, Proc. of a March 2004 Workshop, RAND Corp., Santa Monica, California, March 2004.
5. Bruns, G., and M. Huth, Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis, Proc. of CSF 2008, pp. 163–178, IEEE Computer Society Press, 2008.