1. Security kernel design and implementation: An introduction;Ames;Computer,1983
2. A unification of computer and network security concepts;Anderson;Proc. of the IEEE 1985 Symposium on Security and Privacy,1985
3. Department of Defense Trusted Computer System Evaluation Criteria;DoD,1985
4. A Guide to Understanding Discretionary Access Controls in Trusted Systems;DoD,1987
5. Non-discretionary controls for inter-organization networks;Estrin;Proc. of IEEE Symposium on Security and Privacy,1985