1. Term rewriting and all that;Baader,1998
2. Term rewriting for access control;Barker,2006
3. Bauer, L., J. Ligatti and D. Walker, Composing security policies with polymer., in: V. Sarkar and M.W. Hall, editors, PLDI (2005), pp. 305–314
4. Bell, E. D. and L.J. LaPadula, Secure computer systems: Mathematical foundations, Technical Report Mitre Report ESD-TR-73-278 (Vol. I-III), Mitre Corporation (1974)
5. Introduction to Computer Security;Bishop,2004