1. D.E. Bell. Secure computer systems: A network interpretation. In Third Annual Computer Security Application Conference, pages 32–39, 1987.
2. D.D. Clark and D.R. Wilson. A comparison of commercial and military computer security policies. In Proceedings IEEE Computer Society Symposium on Security and Privacy, pages 184–194, Oakland, CA, May 1987.
3. David Ferraiolo and Richard Kuhn. Role-based access controls. In 15th NIST-NCSC National Computer Security Conference, pages 554–563, Baltimore, MD, October 13–16 1992.
4. T.M.P. Lee. Using mandatory integrity to enforce “commercial” security. In Proceedings IEEE Computer Society Symposium on Security and Privacy, pages 140–146, Oakland, CA, May 1988.
5. Matunda Nyanchama and Sylvia Osborn. Modeling mandatory access control in role-based security systems. In Database Security VIII: Status and Prospects. To appear, 1996.