1[1]Fraser T. LOMAC: Low Water-Mark Integrity Protection tor COTS Environments. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, 2000-05
2[2]Bell D E, LaPadula L J. Secure Computer Systems: Mathematical Foundations. ESD-TR-73-278, Vol. I, AD 770 768, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base,Bedford, MA, USA, 1973-11
3[3]Biba K J. Integrity Considerations for Secure Computer Systems. ESDTR-76-372, NTIS AD-A039324, Electronic Systems Division, Air Force Systems Command, 1977-04
4[4]Spencer R, Smalley S, Loscocco P, et al. The Flask Security Architecture: System Support for Diverse Security Policies. Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, 1999-08:123-139
5[5]Loscocco P, Smalley S. Integrating Flexible Support for Security Policies into the Linux Operating System. In Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference,Boston, Massachusetts, 2001-06