1. David Elliott Bell and Leonard J. LaPadula. 1973. Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244. The MITRE Corporation, Bedford, MA.
2. DOD 5200.28-STD. DOD Trusted Computer System Evaluation Criteria (Orange Book), https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/dod85.pdf.
3. Chris Dalton and Tse Huong Choo. 2001. An Operating System Approach to Securing E-Services.Communications of the ACM, 44(2), 58--64.
4. Charlie Kaufman, Radia Perlman, and Mike Speciner. 1995. Network Security: Private Communication in a Public World. PTR Prentice Hall, Englewood Cliffs, New Jersey.
5. Information Technology Code of Practice for Information Security Management: BS ISO 17799. 2005. BSI Standards.