[1]WfMC.The workflow reference model TC00-1003[EB/OL].http://www.wfmc.org/standards/docs/tc003v11.pdf, 1995-01. [2]WfMC. Workflow security considerations-white paper TC-1019[EB/OL]. http://wfmc.org/standards/docs/TC-1019_10_SecurityPaper_1998.pdf, 1998-02.
[3]SANDHU R, COYNE R, FEINSTEIN H, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2):38-47.
[4]ATLURI V, HUANG W K. An authorization model for workflow[A]. Proceedings of the 4th European Symposium on Research in Computer Security[C]. NY, USA: ACM Press, 1996. 238-255.
[5]BERTINO E, FERRARI E, ATLURI V. The specification and enforcement of authorization constraints in workflow management systems[J]. ACM Transactions on Information and System Security, 1999, 2(1): 65-104.
[6]FERRAIOLO D F, SANDHU R, GAVRILA S. Proposed NIST standard for role-based access control[J]. ACM Transactions on Information and System Security, 2001, 4(3): 224-274.
|