
@book{Org,
	author =	{Dag Ingvar Jacobsen and Jan Thorsvik},
	title =		{Hur moderna organisationer fungerar},
	year =		{1998},
	publisher =	{Studentlitteratur},
	note  = 	{Written in swedish},
}

@book{Andersson,
	author =	{Ross Andersson},
	title =		{Security Engineering - A Guide to Building Dependable Distribution Systems},
	year =		{2001},
	publisher =	{John Wiley \& Sons, Inc.},
}

@book{Amoroso,
	author =	{Edward Amoroso},
	title =		{Fundamentals of Computer Security Technology},
	year =		{1994},
	publisher =	{Prentice Hall},
	pages =		{1--158, 205--225, 253--267, 295--314},
}

@book{Bishop,
	author =	{Matt Bishop},
	title =		{Computer Security, Art and Science},
	year =		{2003},
	publisher =	{Addison Wesley},
	pages =		{1--167, 341--609},
}

@book{Phleger,
	author =	{Charles P. Pfleeger},
	title =		{Security in Computing, Second edition},
	year =		{1997},
	publisher =	{Prentice Hall},
	pages =		{176--333},
}

@book{Schneier,
	author =	{Bruce Schneier},
	title =		{Secrets and Lies},
	year =		{2000},
	publisher =	{John Wiley \& Sons, Inc.},
}

@book{SecureCoding,
	author =	{Mark G. Graff and R. van Wyk},
	title =		{Secure Coding, Principels and Practices},
	year =		{2003},
	publisher =	{O'Reilly},
}

@book{Sudkamp,
	author =	{Thomas A. Sudkamp},
	title =		{Languages and Machines, An Introduction to the Theory of Computer Science. Second Edition},
	year =		{1997},
	publisher =	{Addison Wesley},
}

@book{Tanenbaum,
	author =	{Andrew S. Tanenbaum},
	title =		{Modern Operation Systems, 2nd Edition},
	year =		{2001},
	publisher =	{Prentice Hall},
}

@book{software_engineering,
	author =	{Shari L. Phleeger},
	title =		{Software Engineering: Theory and Practice, 2nd Edition},
	publisher =	{Prentice Hall},
}

@book{grimaldi,
	author = {Ralph P. Grimaldi},
	title  = {Discrete and Combinatorial Mathematics},
	year   = {April 2000},
	publisher = {Addison Wesley Longman},
}

@book{logic,
	author = {Mordechai Ben--Ari},
	title  = {Mathematical Logic for Computer Science},
	year   = {2001},
	publisher = {Springer},
}

@book{oreilly_selinux,
        author = {Bill McCarty},
        title = {SELinux -- NSA's Open Source Security Enhanced Linux},
        year = {2004},
        publisher = {O'Reilly},
}

@article{Harrison,
	author =        {Harrison, Ruzzo and Ullman},
	year =          {1976},
	journal =       {Communications of the ACM},
	pages =         {461--471},
	title =         {Protection in Operating Systems},
	volume =        {19 (8)},
}

@article{Sandhu,
	author =        {Ravinderpal Singh Sandhu},
	year =          {1988},
	journal =       {Communications of the ACM},
	pages =         {404--432},
	title =         {The Schematic Protection Problem: Its Definition
    and Analysis for Acyclic Attenuating Schemes},
	volume =        {35 (2)},
}

@article{usenix_dte_unix_prot,
	author =        {{Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker and Sheila A. Haghighat}},
	year =          {1995},
	journal =       {Proceedings of the Fifth USENIX UNIX Security Symposium, Salt Lake City, Utah},
	title =         {A Domain and Type Enforcement UNIX Prototype},
}

@article{usenix_dte_root,
	author =        {{Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J Petkac, David L. Shermann and Karen A. Oostendorp}},
	year =          {1996},
	journal =       {Proceedings of the Sixth USENIX UNIX Security Symposium, San Jose, California},
	title =         {Confining Root Programs with Domain and Type Enforcement (DTE)},
}

@article{rbac_base,
	author =        {{Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman}},
	year =          {1996},
	journal =       {IEEE Computer},
	pages =         {38--47},
	title =         {Role-Based Access Control Models},
	volume =        {29 (2)},
}

@article{rbac_conf,
	author =        {Sylvia Osborn, Ravi S. Sandhu and Qamar Munawer},
	year =          {2000},
	journal =       {ACM Transactions on Information and Systems Security},
	pages =         {85--106},
	title =         {Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies},
	volume =        {3 (2)},
}

@article{algebra_old,
	author =        {Duminda Wijesekera and Sushil Jajodia},
	year =          {November 2003},
	journal =       {Proceedings of the 8th ACM conference on Computer and Communications Security},
	pages =         {38--47},
	title =         {Policy Algebras for Access Control - The Propsitional Case},
}
@article{algebra,
	author =        {Duminda Wijesekera and Sushil Jajodia},
	year =          {May 2003},
	journal =       {ACM Transactions on Information and Systems Security},
	pages =         {286-325},
	title =         {A Propsitional Policy Algera for Access Control},
	volume =        {6 (2)},
}

@unpublished{inevitability,
	author =        {{Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor, S. Jeff Turner and John F. Farrell}},
	title =         {The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments},
	note =        {\href{http://www.nsa.gov/selinux/papers/inevit-abs.cfm}{http://www.nsa.gov/selinux/papers/inevit-abs.cfm} (visited 2005--11--15)},
}

@unpublished{flask,
	author =	{{Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen and Jay Lepreau}},
	title =		{The Flask Architecture: System Support for Diverse Security Policies},
	note=		{\href{http://www.nsa.gov/selinux/papers/flask-abs.cfm}{http://www.nsa.gov/selinux/papers/flask-abs.cfm} (visited 2005-11-15)},
}

@unpublished{selinux,
    author = {NSA},
    title = {Security--Enhanced Linux},
    note = {\href{http://www.nsa.gov/selinux/}{http://www.nsa.gov/selinux/} (visited 2006--12--31)},
}

@unpublished{selinux_meeting,
	author =	{Peter A. Loscocco, NSA and Stephen D. Smalley, NAI Labs},
	title =		{Meeting Critical Security Objectives with Security Enhanced Linux},
	note=		{\href{http://www.nsa.gov/selinux/papers/ottawa01-abs.cfm}{http://www.nsa.gov/selinux/papers/ottawa01-abs.cfm} (visited 2005--11--15)},
}

@unpublished{selinux_integrating,
	author =	{Peter Loscocco and Stephen Smalley},
	title =		{Integrating Flexible Support for Security Policies into the Linux Operating System},
	note=		{\href{http://www.nsa.gov/selinux/papers/freenix01-abs.cfm}{http://www.nsa.gov/selinux/papers/freenix01-abs.cfm} (visited 2005--11--15)},
}

@unpublished{selinux_lsm,
	author =	{Stephen Smalley, Chris Vance and Wayne Salamon},
	title =		{Implementing SELinux as a Linux Security Module},
	note=		{\href{http://www.nsa.gov/selinux/papers/module-abs.cfm}{http://www.nsa.gov/selinux/papers/module-abs.cfm} (visited 2005--11--15)},
}

@unpublished{selinux_configure,
	author =	{Stephen Smalley},
	title =		{Configuring the SELinux Policy},
	note=		{\href{http://www.nsa.gov/selinux/papers/policy2-abs.cfm}{http://www.nsa.gov/selinux/papers/policy2-abs.cfm} (visited 2005--12--14)},
}

@unpublished{linux_netlink_rfc,
	author =	{Salim,Khosravi, Kleen and Kuznetsov},
	title =		{Linux Netlink as an IP Services Protocol},
	note=       {\href{http://rfc3549.x42.com/}{http://rfc3549.x42.com/} (visited 2005--11--14)},
}

@unpublished{linux_netlink_man,
	author =	{Linux Programmer's Manual},
	title =		{NETLINK (7)},
	note=       {\href{http://www.linuxinfor.com/english/man7/netlink.html}{http://www.linuxinfor.com/english/man7/netlink.html} (visited 2005--11--14)},
}

@unpublished{fedora_selinux,
	author =	{Fedora Project},
	title =		{SELinux FAQs},
	note=       {\href{http://fedora.redhat.com/docs/selinux-faq/}{http://fedora.redhat.com/docs/selinux-faq/} (visited 2005--12--14)},
}


@unpublished{RBAC,
	author =	{NIST/ITL Bulletin},
	title =		{An introduction to role--based access control},
	note=		{\href{http://csrc.nist.gov/rbac/NIST-ITL-RBAC-bulletin.html}{http://csrc.nist.gov/rbac/NIST-ITL-RBAC-bulletin.html} (visited 2005--11--15)}
}

@unpublished{novell_suse,
	author =	{Novell},
	title =		{SuSe Linux 10.0},
	note=       {\href{http://www.novell.com/products/suselinux/security.html}{http://www.novell.com/products/suselinux/security. html} (visited 2006--01--23)},
}

@unpublished{Systrace,
	title =		{Systrace Policy Generation},
	note=       {\href{http://www.systrace.org}{http://www.systrace.org} (visited 2006--01--23)},
}



@unpublished{remote_surgery,
	author =	{Brown Biomed department},
	title =		{Robotic Surgery},
	note=       {\href{http://biomed.brown.edu/Courses/BI108/BI108_2005_Groups/04/index.html}{http://biomed.brown.edu/Courses/BI108/BI108\_2005\_Groups/04/index.html} \\ (visited 2005--11--14)},
}

@unpublished{CommonCriteria,
	author =	{IACS},
	title =		{Common Criteria levels},
	note= 	{\href{http://www.cesg.gov.uk/site/iacs/index.cfm?menuSelected=1\&displayPage=13}{http://www.cesg.gov.uk/site/iacs/index.cfm? menuSelected=1\&displayPage=13} (visited 2005--11--15)},
}

@unpublished{op_assurance,
	author =	{CSRC},
	title =		{Security and Planning in the Computer System Life Cycle},
	note=  {\href{http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter8.html}{http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter8.html} (visited 2005--11--15)},
}

@unpublished{freebsd_mac,
    author = {FreeBSD Handbook},
    title  = {FreeBSD Handbook},
    note   = {\href{http://www.freebsd.org/doc/en\_US.ISO8859-1/books/handbook/mac.html}{http://www.freebsd.org/doc/en\_US.ISO8859-1/books/handbook/mac.html} (visited 2007--01--02)},
}

@unpublished{openbsd,
    author = {OpenBSD project},
    title  = {OpenBSD Security},
    note   = {\href{http://openbsd.org/security.html}{http://openbsd.org/security.html} (visited 2005--12--05)},
}

@unpublished{selinux_reference,
    author = {Security Enhanced Linux Reference Policy Project},
    title  = {Security Enhanced Linux Reference Policy},
    note   = {\href{http://serefpolicy.sourceforge.net/index.php}{http://serefpolicy.sourceforge.net/index.php} (visited 2006--02--24)},
}

@unpublished{planet_selinux,
    title  = {Planet SELinux},
    note   = {\href{http://www.selinuxnews.org/planet}{http://www.selinuxnews.org/planet} (visited 2006--03--19)},
}

@unpublished{tresys,
    title  = {Tresys Technology},
    note   = {\href{http://www.tresys.com}{http://www.tresys.com} (visited 2006--03--19)},
}

@unpublished{m4,
    author = {GNU Project},
    title  = {GNU m4},
    note   = {\href{http://www.gnu.org/software/m4}{http://www.gnu.org/software/m4} (visited 2006--03--19)},
    
}
