1MARTIN E. Automated test generation for access control policies [ C ]//Proc of Conference on Object-Oriented Programming Systems, Languages, and Applications. New York: Association for Computing Machinery, 2006:752-753.
2FISLER K, KRISHNAMURTHI S, MEYEROVICH L A, et al. Verification and change-impact analysis of access-control policies [ C ]// Proc of the 27th International Conference on Software Engineering. New York : Association for Computing Machinery, 2005:96-205.
3KNORR K. Dynamic access control through Petri net workflows [ C]//Proc of the 16th Annual Computer Security Applications Conference. New York : IEEE Computer Society,2000 : 159-167.
4KNORR K. Multilevel security and information flow in Petri net workflows[ C]//Proc of the 9th International Conference on Telecommunication Systems-Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems. 2001:9-20.
5JIANG Yi-xin, LIN Chuang, YIN Hao, et al. Security analysis of mandatory access control model [ C ]//Proc of IEEE International Conference on Systems, Man and Cybernetics. New York: Institute of Electrical and Electronics Engineers Ine, 2004: 5013-5018.
6ZHANG N, RYAN M, GUELEV D P. Evaluating access control policies through model checking[ C]//Proc of the 8th Information Security Conference. Berlin : Springer-Verlag,2005:446- 460.
7SCHAAD A, LOTZ V, SOHR K. A model checking approach to analysis organizational controls[ C]//Proc of the 11 th ACM Symposium on Access Control Models and Technologies. New York: Associa- tion for Computing Machinery,2006 : 139-149.
8SCHAAD A, MOFFETT J. A lightweight approach to specification and analysis of role-based access control extensions [ C]//Proc of ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, 2002: 13-22.