[1] Project Management Institute. Project management fundamental[M]. Beijing: Tsinghua University Press, 2001(in Chinese). [傲姿时代项目管理教材开发项目组.项目管理基础[M].北京:清华大学出版社,2001.] [2] SANDHU R. Future directions in role-based access control models[A]. MMM-ACNS[C]. Petersburg Russia: Springer-Verlag GmbH, 2001. 22-26.
[3] American National Standards Institute. American national standard for information technology - role based access control[EB]. http://csrc.nist.gov/rbac/rbac-std-nist.pdf , 2003-04.
[4] SANDHU R, COYNE E, FEINSTEIN H, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2): 38-47.
[5] MOYER M J, AHAMAD M. Generalized role-based access control[A]. Distributed Computing Systems[C]. California, CA, USA: IEEE Computer Society, 2001. 391-398.
[6] KERN A, KUHLMANN M, SCHAAD A, et al. Observations on the role life-cycle in the context of enterprise security anagement[A]. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SAC-MAT 2002)[C]. New York, NY, USA: ACM Press, 2002. 43-51.
[7] Entegrity Company. Policy model and security framework[EB]. http://www.entegrity.com/products/whitepaperall.shtml, 2002.
[8] OASIS. EXtensible access control markup language (XACML) Version 1.0. OASIS Standard[EB]. http://www.oasis-open.org/committees/download.php/2406/oasis-xacml-1.0.pdf, 2003-02-18.
|