References
- The Inevitablility of Failure: The Flawed Assumption of Security in Modern Computing Environments Peter A. Loscocco;Wtephen D. Dmalley;Patric A. Muckelbauer;Ruth C. Taylor;S.Jeff Truner;John F. Farrel
- Proceeding of the 8th USENIX Security Symposium The Flask Security Architecture : System Support for diverse Security Policies Ray Spencer;Stephen Smalley;Peter Loscocco;Mike Hibler;Dave Anderson;Jay Lepreau
- UNICOS Multilevel Security(MLS) Features Users Guide, SG-21111 10.0
- National Coordination Office for Information Technology Research and Development Web.
- DOD 5200.28-STD Department of Defense Trusted Computer System Evaludation Criteria DOD
- Proceeding of the 15th National Computer Security Conference Role-Based Access Control D.Ferraolo;R. Kuhn
- Web Security and Commerce S. Garfinkel
- Proceedings of the 15th National Computer Security Conference Operating System Support for Trusted Applications R. Graubart
- Communications of ACM v.19 no.8 Protection in Operating Systems M. Harrison (et al.)
- Technical report MD A904-97-C-3047 CDRL A003 Assurance in the Fluke Microkernel: Formal Security Policy Model Secure Computing Corporation
- Information Warefare and Security Dorothy E, Denning