D. E. Bell and L. J. Padula, Secure computer systems : Mathematical foundations and model, The MITRE Corporation, 1973.

K. J. Biba, Integrity considerations for secure computer systems, 1975.

M. Blanc, J. Briffaut, D. Gros, and C. Toinard, Piga-hips : Protection of a shared hpc cluster, International Journal on Advances in Security, vol.4, issue.1, pp.44-53, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00671586

E. William, R. Y. Boebert, and . Kain, A practical alternative to hierarchical integrity policies, The 8th National Computer Security Conference, 1985.

J. Briffaut, Formalization and guaranty of security properties for the operating systems : application to the detection of intrusions, 2007.

P. Efstathopoulos, M. Krohn, S. Vandebogart, C. Frey, D. Ziegler et al., Labels and event processes in the asbestos operating system, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.17-30, 2005.
DOI : 10.1145/1095809.1095813

D. F. Ferraiolo and D. R. Kuhn, Role-based access controls, 15th National Computer Security Conference, pp.554-563, 1992.

D. Gros, J. Briffaut, and C. Toinard, Contrôle d'accès mandataire pour windows 7, Symposium sur la Sécurité des Technologies de l'Information et des Communications 2012, 2012.

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

G. Hoglund and J. Butler, Rootkits : Subverting the Windows Kernel, 2005.

P. Loscocco and S. Smalley, Integrating flexible support for security policies into the linux operating system, USENIX Annual Technical Conference (FREENIX '01), 2001.

J. Mclean, Reasoning About Security Models, 1987 IEEE Symposium on Security and Privacy, pp.123-133, 1987.
DOI : 10.1109/SP.1987.10020

M. Miller, Modeling the trust boundaries created by securable objects, WOOT'08 : Proceedings of the 2nd conference on USENIX Workshop on offensive technologies, pp.1-7, 2008.

P. Naldurg, S. Schwoon, S. Rajamani, and J. Lambert, :, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.55-66, 2006.
DOI : 10.1145/1180337.1180343

R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen et al., The flask security architecture : System support for diverse security policies, Proc. of the Eighth USENIX Security Symposium, pp.123-139, 1999.

N. Zeldovich, S. Boyd-wickizer, E. Kohler, and D. Mazières, Making information flow explicit in HiStar, Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, pp.263-278, 2006.
DOI : 10.1145/2018396.2018419