1. Goguen, J., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and privacy, pp. 11–20. IEEE Computer Society Press, Los Alamitos (1982)
2. Denning, D.E.R.: Cryptography and Data Security. Addison-Wesley, Reading (1982)
3. Millen, J.: Covert channel capacity. In: Proceeding IEEE Symposium on Resarch in Security and Privacy. IEEE Computer Society Press, Los Alamitos (1987)
4. Wittbold, J.T., Johnson, D.M.: Information flow in nondeterministic systems. In: IEEE Symposium on Security and Privacy, pp. 144–161 (1990)
5. ENTCS;D. Clark,2002