1. Common Criteria for Information Technology Security Evaluation – Part 2: Security functional requirements. Version 15408-2 FDIS, ISO/IEC SC27 N2162, 15 November 1998
2. Security without identification: transaction systems to make big brother obsolete;Chaum;Commun. ACM,1985
3. D.D. Clark, D.R. Wilson, A comparison of commercial and military computer security policies, in: Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987, pp. 184–194
4. Canadian System Security Centre: The Canadian Trusted Computer Product Evaluation Criteria. Version 3.0e, 1993
5. R. Dierstein, The concept of secure information processing systems and their basic functions, IFIP SEC '90, North-Holland, Amsterdam, 1991, pp. 133–149