1. Anderson, J.P. 1972. Computer Security Technology Planning Study (Volume II). Technical Report ESD-TR-73-51. Bedford, MA: Hanscom AFB.
2. An authorization model for geospatial data
3. Bell, D.E. 2005. Looking Back at the Bell-LaPadula Model. InProceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). Tucson, AZ, 337-351. Los Alamitos, USA: IEEE Computer Society.
4. Bell, D.E. and LaPadula, L.J. 1976. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997. Bedford, MA: The MITRE Corporation.
5. Belussi, A., Bertino, E., Catania, B., Damiani, M.L., and Nucita, A. 2004. An Authorization Model for Geographical Maps. In Proceedings of the 12th ACM International Workshop on Geographic Information Systems (ACM-GIS 2004). Washington, DC, 82-91. New York, USA: ACM.