3Ferraiolo D F. Proposed NIST Standard for Role-based Access Control[J]. ACM Transactions on Information and System Security, 2001, 4(3): 224-225. 被引量:1
4Sandhu R S, Samarati E Access Control: Principles and Practice[J]. IEEE Communications, 1994, 32(9): 40-41. 被引量:1
5Sandhu R S. Coyne E J, Feinstein H L, et al. Role-based Access Control Models[J]. IEEE Computer, 1996, 29(2): 38-39. 被引量:1
6Thomas R K, Sandu R S. Task-based Authorization Controls (TBAC): Models for Active and Enterprise-oriented Authorization Management[C]//Proc. of IFIP' 97. Lake Tahoe, CA, USA: [s. n.], 1997. 被引量:1
7SANDHU R, COYNE E, FEINSTEIN H, et al. Role-based access control models [ J]. IEEE Computer, 1996, V29(2):38-47. 被引量:1
8FERRAIOLO D F, SANDHU R, GAVRILA S A, et al. Proposed NIST standard for role-based access control[J]. ACM Transaction on Information and System Security, 2001, 4(3) : 224 - 274. 被引量:1
9KAPADIA A, AL- MUHTADI J, CAMPBELL D, et al. IRBAC 2000: Secure Intereperability Using Dynamic Role Translation[ R]. Chicago: University of Illinois, 2000. 被引量:1
10ZHANG X, LI Y, NALLA D. An attribute-based access matrix model[A]. Proceedings of the 2005 ACM Symposium on Applied Computing[C].2005.359-363. 被引量:1
6Headayetullah M, Pradhan G K. Interoperability, trust based information sharing protocol and security: Digital Government Key Issues[J]. arXiv preprint arXiv:1008.1670. 2010. 被引量:1
7Headayetullah M, Pradhan G K. Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach[J], International Journal on Computer Science and Engineering.2010,2(03). 被引量:1
9Liu P, Chetal A. Trust-based secure information sharing between federal government agencies[J]. Journal of the American society for information science and technology. 2005, 56(3): 283-298. 被引量:1
10De Cristofaro E, Jihye K. Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization[J]. Security & Privacy, IEEE. 2010, 8(4): 18-24. 被引量:1