4Sandhu R, Coyne E, Feinstein H, et al. Role-based access control models[J]. IEEE computer, 1996,29 (2) : 38-47.
5Ferraiolo D, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001,4(3):224-274.
6ANSI INCITS 359-2004. Role Based Access Control[S]. American National Standards Institute, 2004.
7Osbom S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security (TISSEC), 2000,3 (2) : 85-106.
8Li N,Byun J W,Bertino E. A critique of the ANSI standard on role-based access control[J]. IEEE Security and Privacy, 2007,5 (6) :41-49.
9Ferraiolo D,Kuhn R, Sandhu R. RBAC standard rationale:Comments on "A critique of the ANSI standard on role-based access control"[J]. IEEE Security and Privacy, 2007,5 (6) : 51-53.
10Koch M, Mancini L V, Parisi-Presicce F. A graph-based formali - sm for RBAC[J]. ACM Transactions on Information and System Security,2002,5(3) :332-365.