2Gottlob G,Koch C,Pichler R.Efficient Algorithms for Processing XPath Queries[C]//Proc.of the 28th International Conference on Very Large Date Bases,Hong Kong,China.2002.
3Cormen T H,Leiseron C E,Rivest R L,et al.Introduction to Algorithms[M].潘金贵,译.北京:高等教育出版社,2002.
4胡运发.互关联后继树-一种新型全文数据库数学模型[R].复旦大学计算机与信息技术系,2002.
5http://www. w3. org/TR/REC- xml. World Wide Web Consortium. Extensible Markup language(XML) [ R].
6Fabio Arciniegas. XML开发指南[M].清华大学出版社,2003.
7Ferraiolo D, Sandhu R, et al. Proposed NIST Standard for Role-based Access Control [ J ]. Information and System Security,2001,4 ( 3 ) : 224-274.
8Bell D E, La Padula L J. Security Computer Systems : Mathematical Foundations and Model [J]. M74 -244. Bedford,Mass. Mitre Corp. ,1973.