4Fan Yu, Zhang Qin, Xiao-Ling Jia, et al. Data Mining Application Issues in Fraudulent Tax Declaration Detection [C]. Xi'an: Proceedings of the Second International Conference on Machine Learning and Cybernetics, 2003 : 2202-2206.
5Ferraiolo D F, Kuan D R, Chandramouli R, et al. Rolebased Access Control[M]. Norwood: Artech House, 2003.
6Deng Zhonghua. Analysis and Design of Information System[M]. Beijing: Science Press, 2003.58-61.
9DUEKER K, BUTFER J A. GIS-T enterpise data model with suggested implement choices[J]. URISA Joural, 1998,10( 1 ) : 12-26.
10SANDRA C F, RAMONA E P,ED W, et al. A prototype for pipeline routing using remotely sensed data and geo- graphic information system analysis [ J ]. OElsevier Science Inc, 1995 ( 53 ) : 25-29.