2Helman P, Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans. on Software Engineering, 1993,19(9):886-901.
3Biskup J, Flegel U. Transaction-Based pseudonyms in audit data for privacy respecting intrusion detection. LNCS 1907, Berlin:Springer-Verlag, 2000.28-48.
4Sandhu R, Chen F. The multilevel relational (MLR) data model. ACM Trans. on Information and System Security, 1998,1(1):93-132.
5Lunt TF, Denning DE, Schell RR, Heckman M, Shockley WR. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593 -607.
6National Computer Security Center. A guide to understanding security modeling in trusted systems. Technical Report,NCSC-TG-010, National Computer Security Center, 1992.
7Jajodia S, Samarati P, Subrahmanian VS. A logical language for expressing authorizations. In: Proc. of the 1997 IEEE Symp. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1997.31-42.
8Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning.ACM Trans. on Database Systems (TODS), 1998,23(3):231-285.
9National Computer Security Center. A guide to understanding covert channel analysis of trusted systems. Technical Report,NCSC-TG-030, National Computer Security Center, 1993.