4Acegi security system for spring[EB/OL].http://aeegisecurity.org/,2008-08-20.
5Central authentication service background[EB/OL].http://www.ja-sig.org/products/cas/,2008-08-20.
6Coyne E,Weil T.An RBAC implementation and interoperability standard:The INCITS cyber security 1.1 model[J].IEEE Security and Privacy,2008,6(1):84-87.
7Joshi JBD,Bertino E,Latif U,et al.A generalized temporal role based access control medel[J].lEEE Trans on Knowledge and Data Engineering,2005,17(1):4-23.