References
- Bell D . E. LaPadula L. J. Secure computer system: unified exposition and Multics interpretation MITRE Corporation March 1976 572 Rep. ESD-TR-75-306
- Boshoff , W. H. and von Solms , S. H. 1989 . A path context model for addressing security in potentially non-secure environments . Computers & Security , 8 : 417 – 425 .
- Boshoff , W. H. and Robson , D. 1989 . A Path Context Model for Computer Security Phenomena in Potentially Non-Secure Environments , Rand Afrikaans University . Ph. D. Dissertation
- Boshoff , W. H. and von Solms , S. H. 1990 . Application of a path context approach to computer security fundamentals . Information Age , 12 ( 2 ) April : 83 – 90 .
- Goldberg , A. and Robson , D. 1983 . Smalltalk 80: The Language and its Implementation , Addison-Wesley .
- Landwehr , C. E. , ed. 1989 . Database Security II: Status and Prospects , North-Holland .
- Olivier , M. S. and von Solms , S. H. 1992 . Building a secure database using self-protecting objects . Computers & Security , 11 ( 3 ) May : 259 – 271 .
- Olivier M. S. von Solms S. H. A taxonomy for secure object-oriented databases ACM Transactions on Database Systems to appear
- Pfleeger , C. P. 1989 . “ Security in Computing ” . Prentice-Hall .
- Spooner , D. L. and von Solms , S. H. 1989 . The impact of inheritance on security in object-oriented database systems , 6 ( 2 ) : 141 – 150 .
- Spooner , D. L. 1990 . Database Security III: Status and Prospects , Edited by: Landwehr , C. North-Holland .
- Van der Walt , A. P. J. 1970 . Random context languages . Symposium on Formal Languages . 1970 , Oberwolfach, West Germany.
- Wegner , P. 1990 . Concepts and paradigms of object-oriented programming . OOPS Messenger , 1 ( 1 ) 7 – 87 .