5[4]WILLIAM STALLINGS.Crypto graby and Network Security:Principles and Practice [ M ].Second Edition.Prentice Hall,New Jersey,1998.
6米雁辉.网络安全与黑客[M].北京:航空工业出版社,2002..
7凌雨欣 常红.网络安全技术与反黑客[M].北京:冶金出版社,2002..
8Blaze, Feigenbaum,and Strauss. Compliance checking in the Policy Maker trust management system. In FC:International conference on Financial cryptography. LNCS,Springer-Verlag,1998.
9Loral. Kassab and Jeffreg voas,Agent Turstworthiness,URL: http: //www.siteseer.net
10Ajay chander, Drew Dean and John C. Mitchell,A state-Transtion Model of Trust Management and Access Control,URL: http: //www.siteseer.net