2Yang Ming, Guo Shuxu. Research and realization of security policy in IPSec based on ID3 algorithm. In:lst International Conference on Multimedia Information Networking and Security (MINES 2009 ), 2009. 被引量:1
3Sandhu R S. Role activation hierarchies. In: Proceedings of the third ACM/NIST role based access control workshop, fairfax, virginia, USA, ACM Press, October 1998. 被引量:1