2McLean J. Security Models and Information Flow. In:IEEE Symposium on Security and Privacy, pp. 180-189.
3Ferraiolo D, Cugini J, Kuhn D R. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conf IEEE Computer Society Press, 1995.
4Ferraiolo D,Kuhn D R. Role Based Access Control. In:the Proc of the 15th National Computer Security Conf. Vol Ⅱ ,1992. 554-563.
5RBAC in the Solaris [tm] Operating Environment. wwws. sun.com/soft ware/whitepapers/wp-rbac /.
6Chandramouli R,Sandu R. Role Based Access Control Features in Commercial Database Management Systems. In: 21^st National Information Systems Security Conf. Oct. 1998.
7Sandhu R S, Coyne E J, Feinstein H L, Youman C E. Role-based access control models. IEEE Computer, 1996,29(2) : 38-47.
8Sandhu R S, Coyne E J, Feinsten H L, Youman C E. Role-Based Access Control: A Multi-Dimensional View. In:Proc of 10^th Annual Computer Security Applications Conf. 1994.54-62.
9Jansen W A. A Revised Model for Role Based Access Control. NIST-IR 6192, July 1998.
10Gavrila, Barkley. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. In: Third ACM Workshop on Role-Based Access Control.