1. R. Agrawal, R. Srikant (1994): Fast algorithms for mining association rules. In J. Bocca, M. Jarke, C. Zaniolo (eds.), Proceedings of the 20th VLDB Conference. Morgan Kaufman Publishers, 487–499.
2. K. J. Biba (1977): Integrity considerations for secure computer systems. Technical Report ESD-TR-76–372, MITRE Corp., Redford, MA.
3. D. E. Bell, L.J. LaPadula (Nov, 1973 ): Secure computer systems: mathematical foundations. Technical Report ESD-TR-73–278, MITRE Corp., Redford, MA.
4. S. Castano, M.G. Fugini, G. Martella, P. Samarati (1995): Database Security. Addison-Wesley.
5. Carter, Katz (Dec, 1996 ): Computer crime: an emerging challenge for law enforcement. FBI Law Enforcement Bulletin, 1–8.