1. Alpern, B., Schneider, F.B.: Defining liveness. Inform. Processing Letters 21(4), 181–185 (1985)
2. Bauer, L., Ligatti, J., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. Int. J. of Inform. Sec. 4(1-2), 2–16 (2005)
3. Bielova, N., Massacci, F.: Do you really mean what you actually enforced? In: Proc. of the FAST 2009 workshop, vol. 5491, pp. 287–301. Springer, Heidelberg (2008)
4. Erlingsson, U.: The Inlined Reference Monitor Approach to Security Policy Enforcement. Technical report 2003-1916, Department of Computer Science, Cornell University (2003)
5. Fong, P.W.L.: Access control by tracking shallow execution history. In: Proc. of Symp. on Sec. and Privacy, pp. 43–55. IEEE, Los Alamitos (2004)