2[1]Sandhu RS, Coyne EJ, Feinstein HL et al. Role based Access Control Model. IEEE Computer, 1996, 29(2): 38-47
3[2]Jajodia S, Samarati P, Subrahmanian VS. A Logical Language for Expressing Authorization. IEEE Symposium on Security and Pricacy, 1997
4[3]Bertino E, Samarati P, Jaiodia S.An Extended Authorization Model for Relation Databases. IEEE Transaction on Knowledge and Data Engineering, 1997,9(1)