1. A model for specifying multi-granularity integrity policies;Badger,1989
2. Secure Computer Systems: Mathematical Foundations and Model;Bell,1977
3. Integrity Considerations for Secure Computer Systems;Biba,1977
4. A comparison of commercial and military computer security policies;Clark,1987
5. Department of Defense Trusted Computer System Evaluation Criteria,1983