1Ahn G J,Proceedings of 5th ACM Workshop on Role Based Access Control,2000年
2计算机信息系统安全保护等级划分准则.中华人民共和国国家标准GB 17859-1999
3Ravi S Sandhu, David Ferraiolo,Richard Kuhn. The NIST Model for Role-based Access Control: Towards an Unified Standard [ J/OL ].ACM. 2000.47-63.
4David F Feraiolo, Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J]. ACM Transactions on Information and System Security, 2001, (3) :224-274.
5Ravi Sandhu, Edward J Coyne. Roie-based Access Control Models[ J]. Computer,1996, (2) :38-47.
6Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-based Administration of Roles[ J]. ACM Trans. on Information and Systems Security, 1999, ( 1 ) : 105-135.
7Sylvia Osbom, Yuxia Guo. Modeling Users in Role-based Access Control[ C]. Berlin:Proceedings of the 5th ACM Workshop on Rolebased Access Control( RBAC-00), 2000.26-27.
8Ahn GJ, Arvisandhu. Role-based Authorization Constrains Specification [ J]. ACM Transcations on Information and System Security,2002, ( 3 ) :207-226.