Telezhnikov Vladimir Yu. «System state transformation rules in DP-model of access control in computer networks based on operating systems of Linux» // Applied Discrete Mathematics 2016. №1(31) C.67-85
Kolegov D. N. «Hierarchical role-based access control development» // 2012. №3(17) C.70-76
Kolegov D. N. «Usage formal models for vulnerability analysis » // 2009. №1(3) C.113-116
Devyanin P. N. «Review lection of security models of computer system» // 2009. №2 C.151-190