M. Balser, W. Reif, G. Schellhorn, K. Stenzel, and A. Thums, Formal System Development with KIV, Fundamental Approaches to Software Engineering. Springer LNCS 1783, 2000.
DOI : 10.1007/3-540-46428-X_25

E. Börger and R. F. Stärk, The Abstract State Machines Method for High-Level System Design and Analysis, 2003.
DOI : 10.1007/978-1-84882-736-3_3

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, 1982.
DOI : 10.1109/SP.1982.10014

K. Katkalov, K. Stenzel, M. Borek, and W. Reif, Model-Driven Development of Information Flow-Secure Systems with IFlow, 2013 International Conference on Social Computing, 2013.
DOI : 10.1109/SocialCom.2013.14

J. Rushby, Noninterference, Transitivity, and Channel-Control Security Policies, 1992.

R. Van-der-meyden, What, indeed, is intransitive noninterference?, Proc. European Symposium on Research in Computer Security. Springer LNCS 4734, 2007.