1JaysonFalkner BenGalbraith etal.JSP Web 编程指南[M].北京:电子工业出版社,2002.. 被引量:2
2[1]Ravi Sandhu, E. Coyne, H. Feinstein and C. Youman.Role-based access control model[J]. IEEE Computer,Feb. 1996,29(2):38~47. 被引量:1
3[2]Ravi Sandhu & David Ferraiolo.The NIST Model for role-based access control: towards a unified standard[S]. 5st ACM Workshop on RBAC, 2000:47~63. 被引量:1
4[3]Michael J. Covington. Generalized role-based access control for securing future applications[C]. National Information Systems Security Conference, 2000. 被引量:1
5[4]Tidswell J and Potter J. A dynamically typed access control model[C]. Third Australian Conference on Information Security and Privacy, July 1998,308~319. 被引量:1
6[5]Glenn Faden. RBAC in UNIX administration[C]. 4th ACM Role-Based Access Control Workshop, 1999,95~101. 被引量:1
7[6]Michael J, Swift M. Improving the granularity of access control in Windows NT[C]. Sixth ACM Symposium on Access control models and technologies, May 2001,87~96. 被引量:1
8[7]Andreas Schaad, Jonathan Moffett and Jeremy Jacob. The role-based access control system of a European bank[C]. Sixth ACM workshop on SACMAT.2001,3~9. 被引量:1
9[8]Ravi Sandhu, Qamar Munawer, How to do discretionary access control using roles[C]. 3th ACM workshop on RBAC.1998,47~54. 被引量:1
10[9]Sylvia Osborn. Mandatory access control and role-based access control revisited[C]. Proceedings of the Second ACM Workshop on RBAC, 1997,31~40. 被引量:1