1. K.J. Biba. Integrity considerations for secure computer systems. Technical Report MTR 3153, The Mitre Corporation, Bedford, Massachusetts, June 1975. Also available from USAF Electronic Systems Division, Bedford, Massachusetts, as ESD-TR-76-372, April 1977.
2. M. Bishop. Position: ’Insider’ is relative. In Proceedings of the 2005 New Security Paradigms Workshop, pages 77–78, Lake Arrowhead, California, October 2005.
3. M. Bishop, S. Engle, C. Gates, S. Peisert, and S. Whalen. We have met the enemy and he is us. In Proceedings of the 2008 New Security Paradigms Workshop, Olympic Valley, California, 2008.
4. D.D. Clark and D.R. Wilson. A comparison of commercial and military computer security policies. In Proceedings of the 1987 Symposium on Security and Privacy, pages 184–194, Oakland, California, April 1987. IEEE Computer Society.
5. F.J. Corbató. On building systems that will fail (1990 Turing Award Lecture, with a following interview by Karen Frenkel). Communications of the ACM, 34(9):72–90, September 1991.