1. DE Bell, D.E. and LaPadula, L.J. (1976) Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, MITRE Corp. Bedford, Mass.
2. Binns, L. (1993) Inference Through Secondary Path Analysis. In: Database Security, VI: Status and Prospects, North-Holland, 195–209.
3. Goyal, M.L. and Singh, G.V. (1991) Access Control In Heterogeneous Database Management Systems. Computers and Security, 10(7), North-Holland, 661–669.
4. Graham, G.S. and Denning, P.J. (1972) Protection - Principles and Practice. Proc. of the Spring Joint Computer Conference, AFIPS Press, Vol. 40.
5. Edmond, D. Papazoglou, M. and Tari, Z (1995) R-OK: A Reflective Model for Distributed Object Management. Proc. of the Int. Workshop on Research Issues in Data Engineering, Taiwan. A long version of this paper can be found in the Int. Jnl. of Intelligent and Cooperative Information Systems, 4 (1), 1995.