9Ravi S Sandhu,Edward J Coyne,Hal L Feinstein,et al.Rolebased access control models.IEEE Computer,1996,29(2):38-47
10Kristine Hafner,David Walker.Federated Identity Management at the University of California.http://www.ucop.edu/irc/itlc/ucfedauth/phblicInfo/Project Presentation COVCA-2004-05-26/imgo.html,2004-05-26