[1] B.W. Lampson -- A Note of the Confinement Problem. -- Communications of ACM, v. 16, n. 10, Oct. 1973
[2] B. Schneier -- Applied Cryptography: Protocols, Algorithms, and Source Code in C., 2nd edition -- John Wiley & Sons, New York, 1996
[3] C.-R. Tsai , V.D. Gligor , C.S. Chandersekaran -- A Formal Method for the Identification of Covert Storage Channels in Source Code -- IEEE Transactions on Software Engineering, v.16:6, 1990
[4] J.V.A. James , D.B. Darby , D.D. Schnachenberg -- Building Higher Resolution Synthetic Clocks for Signalling in Covert Timing Channels. — Proceedings of the Eight IEEE Computer Security FOundations Workshop (CSFW'95). -- IEEE, 1995
[5] S.H. Son , R. Mukkamala , R. David -- Integrating Security and Real-Time Requirements Using Covert Channel Capacity. -- IEEE Transactions on Knowledge and Data Engineering, v. 12, n. 6, Nov.-Dec. 2000
[6] J.A. Davidson -- Asymmetric Isolation. — Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC). -- IEEE, 1996
[7] А.А. Грушо -- Скрытые каналы и безопасность информации в компьютерных системах -- Дискретная математика, т.10, вып. 1, 1998
[8] А.А. Грушо -- О существовании скрытых каналов -- Дискретная математика, т.11, вып. 1, 1999
[9] J.-K. Jan , Y.-M. Tseng -- New Digital Signature with Subliminal Channels on the Discrete Logarithm Problem. — Proceedings of the 1999 International Workshops on Parallel Processing. -- IEEE, 1999
[10] С. Симонов , П. Колдышев -- Обеспечение информационной безопасности в вычислительных комплексах на базе мэйнфреймов. -- Jet Info, No. 4, 2002
[11] M. Dam , P. Giambiagi -- Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. — Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW'00). -- IEEE, 2000