1. Biskup, J. “Privacy Respecting Permissions and Rights,” Hildesheimer Informatik-Berichte, Hochschule, Hildesheim, 1987.
2. Biskup, J. “A General Framework for Database Security,” European Symposium on Research in Computer Security, ESORICS, Toulouse, France, 1990.
3. Clark, D.D. and D.R. Wilson. “A Comparison of Commercial and Military Computer Security Policies,” Proceedings of the IEEE Symposium on Security and Privacy, 1987, pp. 184–194.
4. Haigh, J.T. “Modeling Database Security Requirements,” in Landwehr, C. (Ed.). Database Security: Status and Prospects, Elsevier, IFIP, 1987, pp. 45–56.
5. Protection in operating systems