2ITU-T Recommendation X.812. Security Frameworks for open Systems: Access Control Framework.
3Sandhu R, Coyne E J. Role-based Access Control Models.IEEE Computer, 1996 (2).
4Sandhu R. Role-based Access Control laboratory for Information Security Technology. ISSE Department, MS4A4,George Mason University, 1997.
5Sandhu R, Bhamidipati V. The ARBAC97 Model for Role-based Administration of Roles: Preliminary Description and Outline. In Proceedings of the 2th ACM Workshop on Role-based Access Control, ACM,1997.
6Ferraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Reference Implementation Within a Corporate Intranet ACM Transactions on Information Systems Security, 1999-02
7Gavrila S I, Barkley J F. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. Third ACM Workshop on Role-based Access Control, 1998
8Sandhu R, Coyne E J,Feinstein H L,et al. Role-based Access Control Models. IEEE Computer, 1996,29(2)
9Ferraiolo D,Kuhn R.Role-based access controls[A].15th NIST-NCSC National Computer Security Conference[C].1992.554-563.
10Sandhu R S,Coyne E J,Feinstein H L,Youman C E.Role -based access control Models[J].IEEE Computer,1996,29(2):38-47.