4Information Technology Industry Council. ANSI/ INCITS 359-2004 standard. American National Standard for Information Technology-Role Based Access Control [S]. New York: ANSI/INCITS Technical Committee ,2004.
5Ferraiolo D,Kuhn D R. Role based access control[C] // Proceedings of the 15th NIST-NSA National Computer Security Conference, New York USA: 1992.
6Ferraiolo D, Cugini J A, Kuhn D R. Role based access control :features and motivation[C]//Proceedings of the 11th Annual Computer Security Applications Conference ,New Orleans ,New York : 1996.
7Sandhu R S,Coyne E J,Feinstein H L, et al. Role based access control models [J]. IEEE Computer, 1996,29(2):38-47.
8Ferraiolo D F, Barkley J, Kuhn D R. A role based access control model and reference implementation within a corporate intranet [J ]. ACM Trans on Information and System Security, 1999,1 (2) : 34 - 64.
9Pierangela Samarati, Michael K. Reiter, Sushil Jajodia. An authorization model for a public key management service[J]. ACM Trans on Information and System Security (TISSEC). 2001,4 (4) : 453- 482.
10Marc Wilikens, Simone Feriti, Alberto Sanna, et al . A context-related authorization and access control method based on RBAC a case study from the health care domain [C ] // Proceedings of 7th ACM symposium on Access Control Models and Technologies, Monterey, USA : 2002.