3Miller J A, etal. Security in Web-based Workflow Management Systems[C].ACM Trans. on Information and System Security, 2002.
4Sandhu RS, Coyne E J, Feinstein H L, Youman C E. Role Based Access Control Models[J]. In IEEE Comnputer, 1996,29(2):38-47.
5Kandala S, Sandhu R. Secure Role-based Workflow Models[J]. In Proceedings of the 15th IFIP WG 11.3 Wonking Conference on Database Security,Kluwer 2002: 45 - 58.
6Kumar A, Kamik N, Chafle G. Context Sensitivity in Role-based Access Control[J]. ACM SIGOPS Operating Systems Review, July 2002.
7StairRM Reynolds G W 张靖 蒋传海 等译.信息系统原理[M].北京: 机械工业出版社,2000..