1U Leonhardt,J Magee. Security considerations for a distributed location service[J]. Journal of Network and Systems Man-agement, 1998,6( 1 ) : 51-70.
2J H Sahzer, M D Schroeder. The protection of information in computer systems[J]. Proceedings of the IEEE, 1975,63(9): 1278-1308.
3Personal Firewalls:What are they, how do they work? SANS Institute, 2000.
4Gary N Stone, Bert Lundy, Geoffrey G Xie. Network Policy Languages: A survey and a new approach. IEEE Network, 2001.
5G Denker, J Millen, Y Miyake. PKI and revoeation survey [J].Computer Science Laboratory, 2000.
6J Barkley, A CinCotta, D Ferraiolo, S Gavrilla, et al. Role-based access control for the world wide web[D]. Proceedings of The 20th National Information System Security Conference, 1997.
7R S Sandhu, Edwoard J Coyne, Hal L Feinstein. Role-based access control models[J]. IEEE Computer, 1996,29(2):38-47.
8David F Ferraiolo, Ravi S Sandhu. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and Systems Security, 2001, (3):224-274.
9T Jaeger,A Prakash. Implementation of a discretionary access control model for script-based systems[D]. Proceedings of The 8th IEEE Computer Security Foundation Workshop,County Kerry,Ireland, June 1995:70-84.