6Sandhu R S, Samarati P. Access control:principle and practice [J]. Communications Magazine, IEEE, 1994,32(9):40~48.
7Sandhu R S, Coyne E J, Feinstein H L, et al . Role-based access control models [J].IEEE Computer, 1996, 29(2):38~47.
8Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security, 2000, 3(2):85~106.
9Steinmuller B, Safarik J. Extending role-based access control model with states [A]. Proc. of the International Conference on Trends in Communications[C]. Bratislava:INSPEC, 2001, 2:398~399.
10Gavrila S, Barkley J. Formal specification for role based access control user/Role and role/role relationship management[A]. Proc. of the Third ACM Workshop on Role-Based Access Control [C]. Virginia:ACM Press, 1998.81~90.