4Sandhu R.Role-based Access Control Models[J].Computer,1996,29(2):38-47.
5Ferraiolo D F,Barkley J F,Kuhn D R.A Role-based Access Control Model and Reference Implementation Within a Corporate Intranet[J].ACM Transactions on Information and System Security,1999,2(1):34-64.