1. Information technology -- Role-Based Access Control (RBAC), INCITS 359--2004, American National Standard for Information Technology, American National Standards Institute, 2004.
2. Information technology - Next Generation Access Control - Functional Architecture (NGAC-FA), INCITS 499--2013, American National Standard for Information Technology, American National Standards Institute, March 2013.
3. D. Bell and L. La Padula. Secure computer systems: unified exposition and MULTICS. Report ESD-TR-75--306, The MITRE Corporation, Bedford, Massachusetts, March 1976.
4. D.F.C. Brewer and M.J. Nash, "The Chinese Wall Security Policy," 1989 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 1--3, 1989, pp. 206--214. http://dx.doi.org/10.1109/SECPRI.1989.36295 [accessed 11/15/15]
5. DoD Computer Security Center, Trusted Computer System Evaluation Criteria (December 1985).