1. Providing process origin information to aid in computer forensic investigations;Buchholz;J Comput Secur,2004
2. On the role of file system metadata in digital forensics;Buchholz;J Dig Invest,2004
3. Bell D, LaPadula L. Secure computer systems: mathematical foundations and model. MITRE report MTR 2547 v2; 1973.
4. Integrity considerations for secure computer systems;Biba,1977
5. Brewer D, Nash M. The Chinese wall security policy. In: Proceedings of the 1989 IEEE symposium on security and privacy; May 1989. p. 206–214.