1. [1] D.E. Bell and L.J. Lapadula, “Secure computer systems: Unified exposition and MULTICS interpretation,” MTR-2997 Rev.1, The MITRE Corporation, Bedford, MA 01730, March 1976.
2. [2] D.E. Bell, “Security policy modeling for the next-generation packet switch,” Proc. IEEE Symp. on Security and Privacy 1988, pp.212-216, April 1988.
3. [3] W.C. Shi, H.L. Liang, and Y.F. Sun, “On scheme for dynamic determination of subjects current sensitivity label,” Acta Electronica Sinica, vol.29, no.8, pp.1046-1049, Aug. 2001.
4. [4] K.J. Biba, “Integrity considerations for the secure computer systems,” Bedford: ESD-TR-76-732, April 1977.
5. [5] B.L. Di Vitol, P.H. Palmquist, E.R. Anderson, and M.L. Johnston, “Sepcification and verification of the ASOS kernel,” Proc. 1990 IEEE Computer Society Symposium on Research in Security and Privaey, pp.61-74, May 1990.