1. P.E. Ammann and Ravi S. Sandhu. The extended schematic protection model. The Journal Of Computer Security, 1(3&4):335–384, 1992.
2. K.J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, The Mitre Corporation, Bedford, MA, April 1977.
3. W. Boebert and R. Kain. A practical alternative to hierarchical integrity policies. In NBS-NCSC National Computer Security Conference, pages 18–27, 1985.
4. D.E. Bell and L.J. LaPadula. Secure computer systems: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, The Mitre Corporation, Bedford, MA, March 1975.
5. D.F.C. Brewer and M.J. Nash. The Chinese wall security policy. In Proceedings IEEE Computer Society Symposium on Security and Privacy, pages 215–228, Oakland, CA, May 1989.