3The Secturity of EMC (RSA). The Insider Security Threat in IT and Financial Services [EB/OL]. http://china.rsa.com/press_release.aspx?id= 9703, 2008-10-13.
4Frederick Gallegos, Daniel Manson, Sandra Allen Senft. Information Technology Control and Audit[M]. CRS Press, 1999.
5R Sandhu,E J Conyne, et al. Role-Based Access Control Models[J]. IEEE Computer, 1996,29(2):38-47.