3Ni P, Liao JX, Wang C, Ren KY. Web information recommendation based on user behaviors. 2009 WRI World Congress on Computer Science and Information Engineering. 2009.3.31-2009.4.2: 426-430.
4Ferraiolo DF, Kuhn DR. Role Based Access Control. 15th National Computer Security Conference. Oct 13-16, 1992: 554 - 563.
5Sandhu RS, Coyne E J, Feinstein HL, et al. Role-based access control modules. IEEE Computer, 1996,2:38-47.
6Ice Cloud, An Introduction to Role-Based Access Control, 2004.
7Sandhu R, Coyne E J, Feinstein, et al. Role-based access control models[J]. IEE[Computer, 1996,29 (2) : 38-47.
8Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-Based Administration of Roles[J]. ACM Transactions on Information and System Security, 1999,2(1) : 105-135.
9Fereaiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST Stan- dard for Role-Based Access Control[J]. ACM Transactions on Information and System Security, 2001,4(3) : 224-274.
10ANSI. American National Standard for Information Technolo- gy-Role Based Access Control[C]//ANSI Int'l Committee for Information Technology Standards. Feb. 2004 : 359.