... 1990, p.63. [43 ] “Some Extensions to the Lattice Model for Computer Security”, Jie Wu, Eduardo Fernandez, and Ruigang Zhang, Computers and Security, Vol.11, No .4 (July 1992), p.357. [44 ] “Exploiting ... p. 141 . [47 ] “A Security Model for Military Message Systems”, Carl Landwehr, Constance Heitmeyer, and John McLean, ACM Transactions on Computer Systems, Vol.2, No.3(August 19 84) , p.198. [48 ] ... Conference), October 1995, p.582. [41 ] “Certification of programs for secure information flow”, Dorothy Denning, Communications of the ACM, Vol.20, No.6 (June 1977), p.5 04. [42 ] “Computer Security: A...