1. KSOS—Development methodology for a secure operating system
2. A Comparison of Commercial and Military Computer Security Policies
3. The structure of the “THE”-multiprogramming system
4. Gligor , V.D. and Gavrila , S.I . Application-oriented security policies and their composition . In Proceedings of the 1998 Workshop on Security Paradigms , Cambridge, England , 1998 . Gligor, V.D. and Gavrila, S.I. Application-oriented security policies and their composition. In Proceedings of the 1998 Workshop on Security Paradigms, Cambridge, England, 1998.
5. Gu , R. et al. CertiKOS: An extensible architecture for building certified concurrent OS kernels . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'16) . ( Nov. 2016 ), 653--669. Gu, R. et al. CertiKOS: An extensible architecture for building certified concurrent OS kernels. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'16). (Nov. 2016), 653--669.