1. International standard ISO 7498-2. information processing systems — Open systems interconnection — Basic reference model — Part 2: Security architecture, 1988.
2. Denial of service attack via ping. CERT Advisory CA-96.26, December 1996. Available at ftp:info.cert.org/pub/cert_advisories/CA-96.26.ping.
3. TCP SYN flooding and IP spoofing attacks. CERT Advisory CA-96.21, September 1996. Available at ftp:info.cert.org/pub/cert_advisories/CA-96.21.tcp_syn_flooding.
4. M. Adabi, M. Burrows, B. Lampson, and G. Plotkin. A calcululs for access control in distributed systems. In J. Fagenbaum, editor, Advances in Cryptology-Crypto'91, LNCS 576. Springer-Verlag, 1991.
5. D. Bailey. A philosophy of security management. In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, Information Security — An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, CA, USA, 1995.