5Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based access control models[J].Computer, 1996,29(2) : 38-47.
6Bertino E,Bonatti P A,Ferrari E.TRBAC:a temporal role-based access control model[J].ACM Transactions on Information and System Security, 2001,4 ( 3 ) : 191-223.
7Damiani M L,Bertino E,Catania B,et al.GEO-RBAC:a spatially aware RBAC[C]//Proc of the Tenth ACM Symposium on Access Control Models and Technologies,Stockholm,Sweden,2005:29-37.
8Chae S H,Kim W,Kim D K.uT-RBAC:ubiquitous role-based access control model[J].Information and Communication Engineers,2006, E89-A( 1 ) : 238-239.
9Fu S,Xu C Z.A coordinated spatio-temporal access control model for mobile computing in coalition environments[C]//Proc of the 19th IEEE International Parallel and Distributed Processing Symposium, Denver, CA, 2005.
10Li N H,Bizri Z,Tripunitara M V.On mutually-exclusive roles and separation of duty[C]//Proc of the 11th ACM Conference on Computer and Communications Security.Washington DC,New York: ACM Press,2004:42-51.