1. US Department of Defense. DoD Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, 1985.
2. C. Bodei, P. Degano, F. Nielson, and H.R.Nielson. Static Analysis of Processes for No Read-Up and No-Write-Down. In Proc. FoSSaCS’99, volume 1578 of Lecture Notes in Computer Science, pages 120–134, Springer-Verlag, 1999.
3. Chiara Braghin, Agostino Cortesi, and Riccardo Focardi. Control Flow Analysis of Mobile Ambients with Security Boundaries. In Bart Jacobs and Arend Rensink, editors, Proc. of Fifth IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS’02), pages 197–212. Kluwer Academic Publisher, 2002.
4. M. Bugliesi and G. Castagna. Secure Safe Ambients. In Proc. 28th ACM Symposium on Principles of Programming Languages (POPL’01), pp. 222–235, London. 2001.
5. L. Cardelli and A. Gordon. Mobile Ambients. In Proc. FoSSaCS’98, volume 1378 of Lecture Notes in Computer Science, pages 140–155, Springer-Verlag, 1998.