4Sandhu R,Coyne E J,Feinstein H Let al.Role-based Access Control Models.IEEE Computer, 1996 ;29(2).
5Kandala S,Sandhu S.Secure Role-Based Workflow Models.In:Proceedings of the 15th IFIPWG 11.3 Working Conference on Database Security.Dordrecht:Kluwer Academic Publishers, 2002.
6Atluri V,Huang W K.An Authorization Model for Workflows.In Proc.Of the Fifth European Symposium on Rsearch in Computer Security, Lecture Notes in Computer Science.New York : Springer-Verlag, 1996.
7Atluri V,Huang W K.A Petri Net Based Safety Analysis of Workflow Authorization Models.Journal of Computer Security, 2000 ; 8(2).
8Sandhu R.Separation of Duties in Computerized Information Systems.In Sushil Jajodia and Carl Landwehr,editors,Database Security, IV : Status and Prospects, North Holland, 1991.
9Adam N R,Atluri V,Huang W K.Modeling and Analysis of Workflows Using Petri Nets.Journal of Intelligent Information Systems,Special Issue on Workflow and Process Management, 1998 ; 10(2).
10Kang M H,Park J S,Froscher J N.Access control mechanisms for inter-organizational workflow.In:Sixth ACM Symposium on Access Control Models and Technologies,Chantilly, VA, 2001.