6Sandhu R,Munawer Q.How to do discretionary access control using roles[C]. Proc the Third ACM Workshop on Role Based Access Control. Barkley:ACM Press, 1998:47-54.
7Osborn S.Mandatory access control and role-based access control revisited [C]. Proc the Second ACM Workshop on Role Based Access Control.Virginia: ACM Press, 1997:31-40.
8Yuan Li-Yan.The documentation of logic SQL[R]. Canada:Alberta University,2005.