1Sandhu R.Role-based access control models[J].IEEE Computer,1996,29(2):34.
2Park J,Sandhu R.Towards usage control models:Beyond traditional access control[C]∥ 7th ACM symposium on access control models and technologies.Monterey:ACM Press,2002:57.
3Hersberg A,Mihaeli J,Mass Y,et al.Access control meets public key infrastructure,or:Assinging roles to strangers[C]∥IEEE Symposium on Security and Privacy.Oakland:IEEE,2000:2-14.
4YU T,MA X,Winslett M.PRUNES:An efficient and complete strategy for automated trust negotiation over the internet[C]∥Conference on computer and communication security.Athens:ACM,2000:210.
5Skogsrud H,Benatallah B,Casati E.A trust negotiation system for digital library web services[J].International Journal on Digital Libraries,2004,4(3):185.
6Skogsrud H,Benatallah B,Casati F.Model-driven trust negotiation for WEB services[J].IEEE Internet Computing,2003,7(6):45.