2[3]Systems Security Engineering Capability Maturity Model Version 2.0. http://www. sse-cmm. org,2001-09-10
3[6]A Code of Practice for Information Security Management.http://emea. bsi-global. com/InformationSecurity/Overview/index. xalter, 2002-12
4[1]Zhang Guangchun,Wu Guangning,Park Dae-Hee. Progress of Insulation On-line Monitoring and Fault Diagnosis Techniques for High Voltage Power Equipment in China. KIEE International Transactions on Electrophsics and Applications(South Korea),2002,12C(1): 1~14
5[4]Jansen W A. A Revised Model for Role Based Access Control.NIST-IR 6192,1998
6Ramesey Norman, Csirmaz ElOd. An Algebraic Approach to the File Synchronization. In: Technical Report TR-05-01.Cambridge MA(USA) : Harvard University, 2001.
7张曾科(ZhangZengke).模糊数学在自动化技术中的应用(TheApplicationofFuzzyMathematicsinAutomationTechnology),Tsinghua University Press)[M].北京:清华大学出版社( Beijing,1997..