5Deefnse ADO. Trusted Computer System Evaluation Crite-ria. Washington DC: U. S. Department of Defense(DoD),1983.
6Lupu E, Slomna M. Conflicts in policy-based distributed sys-tems management. IEEE Transactions on Software Engineer-ing-Special Issue on Inconsistency Management, 1999,25(6): 852-869.
7Lu J, Li R, Lu Z, Hu J,Ma X. Specification and enforce-ment of static separation-of-duty policies in usage control//Proceedings of the 12th Information Security Conference(ISC 2009). Pisa, Italy, 2009: 403-410.
8Li N,Wang Q, Tripunitara M V. Resiliency policies in ac-cess control. ACM Transactions on Information and SystemSecurity, 2009,12(4): 1-34.
9Solworth J A. Approvability//Proceedings of the 1st ACMSymposium on Information, Computer and CommunicationsSecurity(ASIACCS 2006). Taipei, China, 2006: 231-241.
10Dubois D, Lang J, Prade H. Possibilistic logic. Handbook ofLogic in Artificial Intelligence and Logic Programming,Oxford: Oxford University Press, 1994, 3(1): 439-513.