1. Badger, L., Sterne, D.F., Sherman, D.L., Walker, K.M., Haghighat, S.A.: Practical domain and type enforcement for UNIX. In: IEEE S&P, pp. 66–77 (1995)
2. Bell, D.E., LaPadula, L.J.: Secure computer systems: mathematical foundations. Technical report, DTIC Document (1973)
3. Boebert, W., Young, W., Kaln, R., Hansohn, S.: Secure ADA target: issues, system design, and verification. In: IEEE S&P (1985)
4. Boebert, W.E., Kain, R.Y.: A further note on the confinement problem. In: Proceedings Security Technology, pp. 198–202. IEEE (1996)
5. Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: SACMAT, pp. 197–206. ACM (2009)