1[1]Sandhu R, Coyne E, Feinstein H,et al .Role-based Access Control Models. In IEEE Computer, 1996,29(2): 38-47
2[2]Stallings W.Cryptography and Network Security Principles and Practice (Second Edition). Prentice Hall ,2002-08-27
3[3]David F,John F, Barkley D,et al.A Role-based Access Control Model and Reference Implementation Within a Corporate Intranet. ACM Transactions on Information and System Security (TISSEC), ACM Press, 1999,2( 1 )
4[6]Viega J.Network Security with OpenSSL. O'Reilly,2002-06