6[2]Marina Thottan,Chuanyi Ji.Anomaly Detection in IP networks[J].IEEE Transactions on Signal Processing,August,2003,51(8)
7Ravi Sandhu,Edward J Coyne.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
8David F Ferraiolo,Ravi Sandhu,et al.Proposed NIST Standard for Role-based Access Control[J].ACM Transactions on Information and Systems Security,2001,4(3):224-274.
9Using Security in ATMI Applications[EB/OL].http://edocs.bea.com/tuxedo/tux81/sec/secpgm.htm,2003-09.