2Trusted Computer Security Evaluation Criteria . DOD 5200 - STD, Department of Defense, 1985.
3Bell D E, Paladula L J. Secure Computer System: Mathematical Foundations,MTR - 2547, Vol 2, Bedford, MA: MITRE Corp. 1973.
4D Ferraio and and R Kuhn, Role - Based Access Control. In Proc. of the NIST- NSA National Computer Security Conference, 1992.
5Ravi Sandu. Edward Coyne. Hal Feinstein and Charles Youman, "Role- Based Access Control Models. "IEEE Computer, 1996 ;29(2).
6S Osborn, R Sandu and Q Munawer. "Configuring Role- Based Access Control to Enforce Mandatory and Discretionary Access Control Policies" ACM Trans. On Information and System Security,2000;3(2).
7刘怀宇,学位论文,1999年
8SANDHU R S,COYNC E J,FCINSTCIN H L,et al.Role-based access control model [J]. IEEE Computer,1996,29(2) :38-47.
9SANDHU R S,FERRAIOLO D,KUHN R. The NIST model for role-based access control: Towards a unified standard[A]. Proceedings of the Fifth ACM Workshop on Role Based Access Control [C]. Berlin, Germany:ACM, 2000: 47- 63.
10JAEGER T,GIRAUD F,ISLAM N ,et al. A role-based access control model for protection domain derivation and management. [A] Proceedings of the Second ACM Workshop on Role-Based Access Control[C]. Fairfax,Virginia ,USA ..ACM, 1997: 95- 108.