1. Anderson, R.J. 2020. Security Engineering: A Guide to Building Dependable Distributed Systems, 3 ed. Wiley Publishing.
2. Badger, L., D. Sterne, D. Sherman, K. Walker, and S. Haghighat. 1995. Practical domain and type enforcement for unix. In Proceedings 1995 IEEE Symposium on Security and Privacy, 66–77.
3. Barkley, J., K. Beznosov, and J. Uppal. 1999. Supporting relationships in access control using role based access control. In Proceedings of the Fourth ACM Workshop on Role-Based Access Control (RBAC’99), New York, 55–65. Association for Computing Machinery.
4. Bell, D. 2005. Looking back at the Bell-La Padula model. In 21st Annual Computer Security Applications Conference (ACSAC’05)
5. Bell, D.E., and L.J. LaPadula. 1973. Secure computer systems: Mathematical foundations. Draft MTR, The MITRE Corporation, 2.