1. Formal Models for Computer Security;Landwehr;ACM Computing Surveys (CSUR),1981
2. Protection in Operating Systems;Harrison;Communications of the ACM.,1976
3. Lampson B., « Protection», 5th Princeton Symposium of Information Science and Systems, pp. 437-443, 1971.
4. National Computer Security Center (NCSC), «A Guide to Understanding discretionary Access Control in Trusted Systems», 1987.
5. Secure computer systems: Mathematical foundations;Bell,1973