1. Denning D (1976) A lattice model of secure information flow. Commun ACM 19(5):236–243
2. Feiertag RJ, Levitt KN, Robinson L (1977) Proving multilevel security of a system design. In: ACM symposium on operating systems principles, pp 57–63
3. Focardi R, Gorrieri R (1995) A taxonomy of security properties for process algebras. J Comput Secur 3(1):5–34
4. Goguen JA, Meseguer J (1982) Security policies and security models. In: IEEE symposium on security and privacy, pp 11–20
5. Goguen JA, Meseguer J (1984) Unwinding and inference control. In: IEEE symposium on security and privacy, pp 75–86