Graham et al; "Protection--Principles and practice", Proc. Spring Joing Comp. Conf., vol. 40, 1972, Atalantic City, U.S. pp. 417-429. |
Proc. 9th International Conf. on Comp. Comm. Mar. 11, 1988, Tel Aviv, IL, pp. 391-396, Kowalski et al, "Security for Electronic Mail and Telematic Services". |
IEEE Symposium on Security and Privacy, Apr. 1988, Oakland, US, pp. 39-49, Vinter et al, "Extended Discretionary Access Controls". |
ACF2, The Access Control Facility, General Information Manual, Data Access Control, MVS Installations, Data Access Control Sample Rule Sets, and Execution Flow Jan. 15, 1985, pp. 21-23. |
ACF2, The Access Control Facility, Administrator's Guide, "Rule Settings: Access Rules" MVS Installations, p. 74, Jan. 15, 1985. |
IBM OS/VS2 System Programming Library: Supervisor, OS/VS2/MVS/System Products: JES 3 5740-XYN and JES2 5740-XYS, pp. 39-44, Jul. 1985. |
IBM OS/VS2 MVS System Programming Library: Job management, MVS/System Product JES2 5740-XYS and JES3 5740-XYN, GC28 1303-0, pp. 2-1 thru 2-5 Dec. 1982. |