1[1]Bell D, Padula L. Secure computer systems: unified exposition and MULTICS: [Report ESD-TR-75-306]. The MITRE Corporation, Bedford, Massachusetts, March 1976
2[2]Clark D,Wilson D. A comparison of commercial and military computer security policies. In:proc. of the Symp. on Security and Privacy,IEEE Press, 1987. 184~194
3[3]Sandhu R,Coyne E,Feinstein H,Youman C. Role-based access control models. IEEE Computer,1996,29(2)
4[4]Ferraiolo D F,Sandhu R. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 2001,4(3)
5[5]Ahn G,Sandhu R. Role-Based Authorization Constraints Specification. ACM Transactions on Information and System Security,2000,3(4)
6D Ferraio, J Cugini, R Kuhn. Role-Based Access Control ( RBAC ) :Features and Motivations [ C ]. New Orleans, LA : Proceedings of the 1 1 th Annum Computer Security Application Conference, 1995.12-14.
7David F Ferraiolo, John F Barkley, D Richard Kuhn. A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet [ J ]. ACM Transactions on Information and System Security, 1999,2( 1 ) :34-43.
8Sejong Oh, Seog Park. Task-Role-Based Access Control Model [ J].Information Systems, 2003,28 ( 6 ) :533 - 536.