Fetraiolo D,SandHu R S,Cavrila S,Kuhn R,Chandramouli R.Proposed NIST Stand for Role-Based Access Control[J].ACM Tran sactions on Information and System Security,2001,4(3):224-274.
[2]
Kuhn R.Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems[C]//Second ACM Workshop on Role-Based Access Control(R BAC97),1997.
[3]
Ahn C-J,Sandhu R S.Role-Based Authorization Constraints Specification[J].ACM Transaction on Information and System Security,2000,3(4):207-226.
[4]
Ferraiolo D,Kuhn R.Role-based access control[C]//15th NIST-NCSC National Computer Security Conference.1992:554-563.
[5]
Sal-ldhu R S,Coyne E J,Femitein H L,Youman C E.Role-Based Access Control Model[J].IEEE Computer,1996,29(2):38-47.
[6]
Bertino E,Catnnia B,Fena''ft E,Perlasea P.A Logical Framework for Reasoning about Access Control Models[J].ACM Tran saction on Information and System Security,2003,6(1):71-127.
[7]
Bertino E,Bettini C,Ferrari E,Samarati P.An Access Control Model Supporting Periodicity Constrains and Temporal Reasoning[J].ACM Tran saction on Database system,1998,23(3):231-285.