7LAND WEHR C E. Formal models for computer security [J].Computing Surveys, 1981, 13(3):247-278.
8FERRAIOLO D F,KUHN D R. Role-based access controls [A].Proceedings of the 15th National Computer Security Conference [C].Baltimore, United States, 1992. 554-563.
9SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-basedaccess control models [J]. IEEE Computer Society, 1996, 29(2):38-47.
10HALTER B J, BRACCE A M, JOHNSON D B, et al. Method andsystem for multimedia access control enablement[P] US:5319705,1994.6-7.