1. An ontological approach to the document access problem of insider threat;Aleman-Meza,2005
2. Security Engineering: A Guide to Building Dependable Distributed Systems;Anderson,2001
3. Digital rights management – an overview of current challenges and solutions;Arnab,2004
4. Secure Computer Systems: Mathematical Foundations and Model;Bell,1973
5. Bypassing information leakage protection with trusted applications;Blasco;Comput. Secur.,2012