1. Extending the Schematic Protection Model—I: authentication and conditional tickets;Varadharajan,1994
2. The schematic protection model: its definition and analysis for acyclic attenuating schemes;Sandhu;Journal of the ACM,1988
3. Expressive power of the schematic protection model;Sandhu;Journal of Computer Security,1992
4. A distributed implementation of the extended schematic protection model;Ammann,1991
5. An analysis of the proxy problem in distributed systems;Varadharajan,1991