1. Aho. A., Hoperoft J., Ullman J., (1974) The Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, MA.
2. Department of Defence (1985) Trusted Computer System Evaluation Criteria,DOD 5200.28-STD.
3. Fitch J.A. III, Hoffman L.J., (1991) The Cascade problem: Graph Theory can help, Proceedings of the 14th National Computer Security Conference, pp. 88 – 100.
4. Fitch J.A. III, Hoffman L.J., (1993) A shortest path network security model, Computers and Security, Vol. 12, pp. 169 – 189.
5. Freund J. E., (1962) Mathematical Statistics, Prentice Hall, Englewood Cliffs, N.J.