FERRAIOLO D,BARKELY J,KUHN R.A role-based access control model and reference implementation within a corporate Intranet[J].ACM Transactions on Information and System Security,1999,2(1):34-64.
[2]
SANHU R S,COYNE E J,FEINSTEIN H L.Role-based access models[J].IEEE Computer,1996,29(2):38-47.
[3]
SANDHU R,MUNAWER Q.The RRA97 model for role-based administration of role hierarchies[A].Proceedings of 14th Annual Computer Security Application Conference[C].Scotsdale,AZ:1998.39-49.
[4]
SANDHU R,MUNAWER Q. The ARBAC99 model for administration of role-based access control[A].Proceedings of 15th Annual Computer Security Application Conference[C].Scotsdale, AZ:1999.46-57.
[5]
ZHONG Hua,FENG Yulin JIANG Hongan. A role hierarchy model for role-based access control and its application[J]. Journal of Software,2001,11(6):779-784(in Chinese).[钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784.]