References
- 'Common Criteria for Information Technology Security Evaluation', Ver 3.1, September 2006, CCMB-2006-09-003
- Frank Koob, Markus Ullmann, Stefan Wittmann, 'The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process', Lecture Note in Computer Science, Springer, LNCS 1641, pp. 302-310, 1998
- R. Richards, D. Greve, M. Wilding, W. Mark Vanfleet, 'The Common Criteria, Formal Methods, and ACL2,' ACL2 Workshop 2004
- Mark S. Merkow and Jim Breihaupt, Computer security assurance using the common criteria, Thomson/Delmar Learning, Clifton Park, NY, 2005
- Woodcook, J. Davies, J., 'Using Z : Specification, refinement, and proof' Prentice-Hall, Inc. Upper Saddle River, NJ, USA, 1996
- Information Technology Security Evaluation Criteria, Office for Official Publications of the European Communities, Lexembourg 1991
- Junkil Park, Jin-Young Choi,'Formal Security Policy Model for a Common Criteria Evaluation', ICACT 2007, Korea, February 2007, pp. 277-281