3[1]Bell D, Padula L. Secure computer systems: unified exposition and MULTICS: [Report ESD-TR-75-306]. The MITRE Corporation, Bedford, Massachusetts, March 1976 被引量:1
4[2]Clark D,Wilson D. A comparison of commercial and military computer security policies. In:proc. of the Symp. on Security and Privacy,IEEE Press, 1987. 184~194 被引量:1
5[3]Sandhu R,Coyne E,Feinstein H,Youman C. Role-based access control models. IEEE Computer,1996,29(2) 被引量:1
6[4]Ferraiolo D F,Sandhu R. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 2001,4(3) 被引量:1
7[5]Ahn G,Sandhu R. Role-Based Authorization Constraints Specification. ACM Transactions on Information and System Security,2000,3(4) 被引量:1
8[1]Sejong Oh,Seog Park.Task-Role-rased access control model.Information Systems,2003 ;28 (6):533-536 被引量:1
10Fei Y.K., Wang Z.J. A concept model of Web components. In: Proceedings of IEEE International Conference on Services Computing, Shanghai, 2004, 159~164 被引量:1
4Aringhieri R, Damiani E, De Capitant di Vimercati S, et al. Assessing efficiency of trust management in Peer- to- Peer systems[J]. IEEE, 2005,20(13/15) :368- 373. 被引量:1
5Ali Aydin Selcuk, Ersin Uzun, Mark Resat Pariente. A reputation- based trust management system for P2P networks[ J ]. IEEE 2004,1336575 (19/22) : 251 - 258. 被引量:1