1. Protection in operating systems;Harrison;Commun. Assoc. Comput. Mach.,1976
2. A linear time algorithm for deciding security;Jones,1976
3. Analysis and synthesis in the Take-Grant system;Snyder,1977
4. Formal models of capability-based protection systems;Snyder;IEEE Trans. Comput.,1981