6E.Bertino, P.Samarati, S.Jajodia. A Temporal Access Control Mechanism for Database System[J]. IEEE Transactions on Knowledge and Data Engineering,2004.8(1):67-80.
7N.R.Adam, V.Atluri. A Content-Based Authorization Model for Digital Libraries[J]. IEEE Transactions on Knowledge and Data Engineering,2005.14(2):263-301.
8D.W Chadwick, A. Otenko. RBAC POLICIES IN XML FOR X.509 BASED privilege management[DB/DK], http://www.permis.org, 2002.11.14.
9Jesus Salceda, Ivan Diaz, Juan Tourino,Ramon Doallo. A middlew architecture for distributed systems management[J]. Journal of Parallell and Distributed Computing,2004.64(9):59-66.
10Xin Wang, Henning Schulzrine, Dilip Kandlur, Dinesh Verma. Measurement and Analysis of LDAP Performance[J]. ACM Computer Communication Review,2003.27:65-73.