2OSBORN S,SANDHU R,MUNAWER Q.Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Transactions on Information and System Security,2000,3(2):85-106.
3KAPADIA A,AL-MUHTADI J,CAMPBELL R.Secure interoperability using dynamic role translation[C]∥ Proceedings of the First International Conference on Internet Computing.Las Vegas:CSREA Press,2000:231-238.
4JOSHI J B D,BHATTI R,BERTINO E,et al.Access-control language for multidomain environments[J].IEEE Internet Computing,2004,8(6):40-50.
5BONATTI P,VIMERCATI S D C,SAMARATI P.An algebra for composing access control policies[J].ACM Transactions on Information and System Security,2002,5(1):1-35.
6SHAFIQ B,JOSHI J B D,BERTINO E,et al.Secure interoperation in a multidomain environment employing RBAC policies[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(11):1557-1577.
7AO Xu-hui,NAFTALY H.Flexible regulation of distributed coalitions[C]∥Proceedings of the 8th European Symposium on Research in Computer Security.Berlin:Springer,2003:29-60.
8SANDHU R,FERRAIOLO D,RICHARD K.The NIST model for role-based access control:towards a unified standard[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
9GONG L,QIAN X L.Computational issues in secure interoperation[J].IEEE Transactions on Software and Engineering,1996,22(1):43-52.
10KOCH M,MANCINI L V,PARISI-PRESICCE F.A graph based formalism for RBAC[J].ACM Transactions on Information and System Security,2002,5(3):332-365.