4ORDA A, ROM R. Shortest path and minimum delay algorithms in networks with time dependent edge length [J].Journal of the Association for Computing Machinery, 2002,37(3):607-625.
5LINing Hui, TRIPUNITARA M V. Security analysis in role-based access control[J]. ACM Transactions on Information and System Security, 2006,9(4):391-420.