1L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
2R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.
3D Ferraiolo, R Sandhu,et al. Proposed NIST Standard for Role-based Access Control [ J ]. ACM Transactions on Information and System Security(TISSEC) ,2001,4(3) :224-274.
4R Thomas, R Sandhu. Task-Based Authorization Controls(TBAC) : A Family of Models for Active and Enterprise-Oriented Authorization Management[ C]. Lake Tahoe, CA: Proceedings of the 11th IFIP WG11.3 Conference on Database Security, 1997.
5Gail-Joon Ahn, Myong Kang,et al. Injecting RBAC to Secure a Webbased Workflow System[ C]. ACM RBAC, 2000.
6Sejong Oh, Seog Park. Task-role-based Access Control Model[ J ]. Information System, 2003, 28 : 533-562.
7J Park, R Sandhu. Towards Usage Control Models: Beyond Traditional Access Control[ C]. Proceedings of the 7th ACM Symposium on Access Control Models and Technologies,2002.
8R Sandhu, J Park. Usage Control : A Vision for Next Generation Access Control, MMM-ACNS [ EB/OL]. http://www. list. gmu. edu/conference_papers, htm, 2003.
9Sonera Piazza Ltd MediaLab. Digital Rights Management. White Paper[ EB/OL]. http://www. medialab. sonera. fr/workspace./ DRM-WhitePaper. pdf, 2002.
10Dae-Kyoo Kim,Indrakshi Ray,Robert France et al.Modeling RoleBased Access Control Using Parameterized UML Models.