1. E. Amoroso, Fundamentals of Computer Security Technology, P T R Prentice-Hall, Englewood Cliffs, NJ, 1994.
2. J.P. Anderson, Computer security technology planning study, Technical Report ESD-TR-73-51, Vol. II, Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731, October 1972, [NTIS AD-758 206].
3. L. Badger, D.F. Sterne, D.L. Sherman, K.M. Walker and S.A. Haghighat, Practical domain and type enforcement for UNIX, in: Proc. of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995, IEEE Comput. Soc. Press, pp. 66–77.
4. M. Carney and B. Loe, A comparison of methods for implementing adaptive security policies, in: Proc. of the Seventh USENIX UNIX Security Symposium, San Antonio, TX, January 1998, pp. 1–14.
5. D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik, Itinerant agents for mobile computing, IEEE Personal Communications, October 1995, pp. 34–49.