1. Modern Compiler Implementation in Java;Appel,1998
2. Bell, D.E., LaPadula, L.J., 1975. Secure computer systems: unified exposition and multics interpretation. Tech. Rep. MTR-2997, MITRE Corp., Bedford, MA.
3. Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing robust user.
4. Biba, K.J., 1977. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, MITRE Corp., Bedford, MA.
5. An algebra for composing access control policies;Bonatti;ACM Transactions on Information System Security,2002