This paper gives a brief and informal overview of the security model on which the MLS checker is based and discusses its application and its relationship to other security models and to the requirements of the DoD Trusted Computer System Evaluation Criteria.
dvi or postscript or postscript
@inproceedings{Rushby:HDM, AUTHOR = {John Rushby}, BOOKTITLE = {Proceedings 7th DoD/NBS Computer Security Initiative Conference}, TITLE = {The Security Model of {Enhanced HDM}}, ADDRESS = {Gaithersburg, MD}, PAGES = {120--136}, YEAR = 1984, MONTH = sep }