Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin
Calculus for access control in distributed systems
Transactions on Programming Languages and Systems (TOPLAS), Volume 15,
Issue 4 (September 1993) http://doi.acm.org/10.1145/155183.155225
Sejong
Oh and Ravi Sandhu
A model for role administration using organization structure
Proceedings of the seventh ACM symposium on Access control models and
technologies, 2002 http://doi.acm.org/10.1145/507711.507737
Michael A. Harrison,
Walter L. Ruzzo, and Jeffrey D. Ullman Protection in operating systems Communications of the ACM, 1976 http://doi.acm.org/10.1145/360303.360333
Riecke and Heintze
The SLAM Calculus: Programming with Secrecy and Integrity
Symposium on Principles of Programming Panguages, 1998
http://doi.acm.org/10.1145/268946.268976
A. Sabelfeld and A. C.
Myers Language-Based Information-Flow Security IEEE Journal on Selected Areas in
Communications, vol. 21, no. 1, January 2003 http://www.cs.cornell.edu/andru/papers/jsac/sm-jsac03.pdf Implementation
of Secure Systems
Peter Loscocco and Stephen Smalley
Integrating Flexible Support for Security Policies into the
Linux Operationg System
Usenix 2001 Freenix Track
http://www.nsa.gov/selinux/papers/freenix01.pdf
Chris Wright, Crispin Cowan, Stephen Smalley, James Morris,
Greg Kroah-Hartman
Linux Security Modules: General Security Support for the Linux Kernel
Usenix Security 2002
http://lsm.immunix.org/docs/lsm-usenix-2002/lsm.pdf