2[1]Ravi Sandhu,David Ferraiolo and Richard Kuhn.The NIST Mode for Role-Based Access Control:Towards A Unified Standard.ACM2000,47-63
3[2]Matthnew J Moyer,Mustaque Ahamad.Generalized Role Based Access Control [J] .Proceedings International Conference on Distributed Computing Systems,2001,(4) :391-398
4Schneier S B.Applied Cryptography-Protocols,Algorithms and Sources Code in C [M].New York:John Wiley Sons Inc.,1994:366-367.
5Sandhu R,Ferraiolo D,Kuhn R.The NIST Model for Role - Based Access Conrol:Towards A Unified Standard [A].Proceedings of 5th ACM Workshop on Role - Based Access Control [C].ACM,Berlin,Germany,July 2000.26-28.
6Stinson D R.Cryptography Theory and Practice [M].New york:CRC Press Inc,1995.285-288.
7David F,Ferraiolo,Ravi Sandhu,etal.Richard Kuhn and Ramaswamy Chandramouli.Proposed NIST Standard for Role-Based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
8Sandhu R,Munawer Q.The ARBAC99 Model for Administration of Roles [A].The Proceedings of the Fifteenth Annual Computer Security Applications Conference [C].Scottsdale,AZ,1999.12:142-153.
9StairRM Reynolds G W 张靖 蒋传海 等译.信息系统原理[M].北京: 机械工业出版社,2000..
7Sandhu R, Ferraiolo D, Kuhn R. The NIST model for role-based access control : Towards a unified standard [C]//Pro ceedings of 5th ACM workshop on role based access control. New York : ACM Press, 2000:47-64.
8Osbom S, Sandhu R,Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies [ J ]. ACM Transactions on Information and System Security,2000,3 (2) : 123-132.
9Lin A, Brown R. The application of security policy to rosebased access control and the common data security architecture[ J ]. Computer Communications, 2000,23 ( 17 ) : 1584 - 1593.