5Kim K H. Boolean matrim theory and applications[M]. USD:Dekker, Marcel Incorporated, 1982.
6Sanhu R S, Coyne E J, Feinstein H L, et al. Role-base access models[J]. EIII Computer, 1996,29(2).
7Ahn G J, Arvisandhu. Role-based authorization constraints specification[ J]. ACM Transcations on Information and System Security,2002,3:207 - 226.
8Fang Chen,ACMRBAC Workshop,1996年
9Ravi S Sandhu, David Ferraiolo,Richard Kuhn. The NIST Model for Role-based Access Control: Towards an Unified Standard [ J/OL ].ACM. 2000.47-63.
10David F Feraiolo, Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J]. ACM Transactions on Information and System Security, 2001, (3) :224-274.