1. Saltzer J, Schroeder M (1975) The protection of information in computer systems. Proc IEEE 63(9):1278–1308. https://doi.org/10.1109/PROC.1975.9939
2. Rose S, Borchert O, Mitchell S, Connelly S (2020) Zero trust architecture (tech. rep.). National institute of standards and technology. https://doi.org/10.6028/NIST.SP.800-207
3. Regulation (EU) (2016) 2016/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (general data protection regulation) (text with EEA relevance)
4. Regulation (EU) (2022) 2021/821 of the European parliament and of the council of 20 May 2021 setting up a union regime for the control of exports, brokering, technical assistance, transit and transfer of dual-use items (recast)
5. Xnu/bsd/kern/kern priv.c at 1031c584a5e37aff177559b9f69dbd3c8c3fd30a.apple-oss-distributions/xnu. https://github.com/apple-oss-distributions/xnu/blob/1031c584a5e37aff177559b9f69dbd3c8c3fd30a/bsd/kern/kern_priv.c