2Miller J A, etal. Security in Web-based Workflow Management Systems[C].ACM Trans. on Information and System Security, 2002.
3Sandhu RS, Coyne E J, Feinstein H L, Youman C E. Role Based Access Control Models[J]. In IEEE Comnputer, 1996,29(2):38-47.
4Kandala S, Sandhu R. Secure Role-based Workflow Models[J]. In Proceedings of the 15th IFIP WG 11.3 Wonking Conference on Database Security,Kluwer 2002: 45 - 58.
5Kumar A, Kamik N, Chafle G. Context Sensitivity in Role-based Access Control[J]. ACM SIGOPS Operating Systems Review, July 2002.
6Chang C C,Inform Sci,1997年,96卷,1-2期,15页
7Hw ang M S,Computers Security,1996年,15卷,1期,73页
8Hw ang M S,IEICE Trans Inf Syst,1994年,77卷,9期,1042页
9Hwang J J,Computer J,1992年,35卷,1期,16页
10L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.