2Sandhu R, Conyne EJ, Lfeinstein H, er al. Role based access control models[J].IEEE Computer, 1996,29(2):38-47.
3Sandhu R S,Coyne E J,Feinstein H L,et al.Role-Based Access Control Model[J].IEEE Computer,1995,5 (3):127-130.
4Sandhu R S,Bhamidipati V,Munawer Q.The ARBAC97 Model forRole-Based Administration of Roles[J].ACM Transactions on Information and System Security,1999,2(1):31-36.
5林东.网络信息安全&PGP加密[M].北京:清华大学出版社,1998.
6Tari Z,Chan Shunwu.A role-based access control for intranet security[J].IEEE Intemet Computing,1997,1 (5):24-34.