1. ISO/IEC 15408: Information technology. Security techniques. Evaluation criteria for IT security (2005)
2. Trusted Solaris, http://www.sun.com/software/solaris/trustedsolaris
3. HPUX, http://docs.hp.com
4. RSBAC, http://www.rsbac.org/documentation/rsbac_handbook
5. GRSecurity, http://grsecurity.org