1. Protection;Lampson;ACM SIGOPS Oper. Syst. Rev.,1974
2. Protection: principles and practice;Graham,1972
3. Secure Computer Systems: Mathematical Foundations;Bell,1973
4. Integrity Constraints for Secure Computer Systems;Biba,1977
5. Lattice-based access control models;Sandhu;Computer,1993