1[1]Ferralolo,D F,Sandhu R,Gavrila.S et al.Proposed NIST standard for role-based access control.ACM Transactions on Information and System Security,2001; (3):224-274
2[2]Gross H -G,Melideo M,Sillittic A.Self-certification and trust in component procurement.Science of Computer Programming,2005;56:141-156
3[3]Liu Xiaodong,Wang Beihu,Kerridge J.Achieving seamless component composition through scenario-based deep adaptation and generation.Science of Computer Programming,2005 ;56:157-170
4[4]WFMC-TC-1025 (Document Status-Final).Process Definition Interface--XML Process Definition Language.WFMC.October,2005
5[5]SCA Version 0.9.SCA Service Component Architecture-Assembly Model Specification.BEA Systems,Inc.,International Business Machines Corp,IONA Technologies,Oracle USA Inc,SAPAG.,Siebel Systems,Inc.,Sybase,Inc.,November 2005
6张宗耀,办公自动化技术,1994年,8页
7冯玉才,数据库系统基础(第2版),1993年,9页
8United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
9National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
10BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.