4H A S booysem,J H peloff.Classification of objects for improved access control[J].Computer&Security, 1995 ; 14(3).
5D N J Mostert,S H Solms.A methodology to include computer security ,safety and resilience requirements an part of the user requirment[J].Computer&Security, 1994; 13 ( 4 ).