1Ferraiolo D F, Barkley J F, Kubn D R. A role based access control model and reference implementation within a corporate Intranet [ J ]. ACM Transactions on Information Systems Security, 1999,2 ( 1 ) :34-64. 被引量:1
2Sandhu R, Bhamidipati V. An oracle implementation of the PRA97 Model for permission-role assignment [ C ]. Proc of the 3rd ACM Workshop on RBAC, 1998:13-21. 被引量:1
3Sandhu R, Coyne E J. Role based access control models [ J ]. IEEE Computer, 1996,29 ( 2 ) : 38-47. 被引量:1
4Covington M J. Generalized role-based access control for securing future applications [ C ]. Proc of National Information Systems Security Conference,2000 : 187-196. 被引量:1
5Khayat E J, Abdallah A E. A formal model for flat rolebased access control[ J ]. Computer Systems and Applications ,2003,44( 3 ) :75-87. 被引量:1
6Schneider F B. Least privilege and more[ C ]. Proceedings of the IEEE Symposium on Security and Privacy, 2003: 55 -59. 被引量:1
7Ahn G-J, Sandhu R. Role-based authorzation constraints specification[ J ]. ACM Transactions on Information and System Security, 2000,3 ( 4 ) : 207-226. 被引量:1
8Wainer J, Kumar A. A fine-grained, controllable user-to- user delegation method in RBAC [ C ]. Proc of the 10th ACM Symp On Access Control Models and Technologies. New York : ACM Press ,2005:59-66. 被引量:1