4MILLER M.Cloud Computing:Web-Based Applications ThatChange the Way You Work and Collaborate Online[M].Que PrintPublication,2008.
5SIRISHA A,GEETHAKUMARI G.API access control in cloud usingthe role based access control model[A].Trendz in Information Sci-ences and Computing-TISC2010[C].2010.
6LI D,LIU C,WEI Q,et al.RBAC-Based access control for SaaSsystems[A].2010 2nd International Conference on Information Engi-neering and Computer Science(ICIECS)[C].2010.
7XUE J,ZHANG J J.A brief survey on the security model of cloudcomputing[A].2010 Ninth International Symposium on DistributedComputing and Applications to Business Engineering and Science(DCABES)[C].2010.
8Nat’l Computer Security Center.Trusted network interpretation of thetrusted computer system evaluation criteria[A].NCSC-TG2005[C].1987.
9BELL D E,LAPADULA L J.Secure Computer Systems:Mathemati-cal Foundations[R].The MITRE Corporation,Bedford,Massachus-setts,1973.
10LIN T,BELL Y,AXIOMS L.A“new”paradigm for an“old”model[A].Proc 1992 ACM SIGSAC New Security Paradigms Work-shop[C].1992.