1. Latham, D.C., Department of defense trusted computer system evaluation criteria, 1986.
2. Infrastructure, P.K. and Profile, T.P., Common criteria for information technology security evaluation, 2002.
3. Devyanin, P.N. and Leonova, M.A., Use of subtypes and total functions of the formal Event-B method for description and verification of the MROSL DP model, Program. Inzheneriya, 2020, vol. 11, no. 4, pp. 230–241.
4. Timakov, A.A., Information flow control in software DB units based on formal verification, Program. Comput. Software, 2022, vol. 48, pp. 265–285.
5. Denning, E.D., A lattice model of secure information flow, Commun. ACM, 1976, no. 5, pp. 236–243.