1DAVID F FERRAIOLO,RAVI SANDHU.Proposed NIST Standard for Role-Based Access Control[J].ACM Transcations on informtion and System Security,2001 ;4(3) :224~274
2Ravi S Sandhu,Edward J Conyne.Role-Based Access Control Models[J].IEEE Computer, 1996 ;29(2): 38~48
3ZAHIR TARI,SHUN-WU CHAN.A Role-Based Access Control For Intranet Security[J].IEEE INTRANET COMPUTING, 1997 ;24~25
4DAVID F FERRAIOLO,JOHN F BARKLEY,D RICHARD KUHN.A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet[J].ACM Transactions on Information and System Security, 1999;2(1 )
5SYLVIA OSBORN,RAVI SANDHU,QAMAR MUNAWER.Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies[J].ACM Transactions on Information and System Security,2000;3(2) :85~106
6D Nessett,p Humeen.The multilayer firewall[C].In:Network and Distributed System Security Symposium,1998-03
7Len LaPadula. Secure Computer System:Mathematical Foundations[J].Journal of computer security, 1996;4