2SANDHU R S, COYNE E J, FEINSTEIND H L, et al. Role-Based Access Control[ J ]. Models IEEE Computer, 1996,29(2) :38 -47. 被引量:1
3BARKLEY J F, CINCOTrA A V, FERRAIOLO D F,et al.Role Based Access Control for the World Wide Web [ A ].NIST/NCSC, Proc 20th NIST-NCSC National Information Systems Security Conference[C]. USA: NIST/NCSC,1997. 被引量:1
4Thakur G C. Reservoir management: a synergistic approach [ R ]. SPE 20138,1990. 被引量:1
5Satter A,Vamon J E,Hoang M T,et al. Reservoir management: technical prospective[ R ]. SPE 22350,1992. 被引量:1
6Raza S H. Data acquisition and analysis for efficient reservoir management[ R]. SPE 20749,1992. 被引量:1