2[1]Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based Access Control Models. IEEE Computer, 1995
3[2]Maly K J, Gupta A, Levinstein I B. A Privilege Management System for A Secure Network. Services in Distributed and Networked Environments, 1996.
4[3]ITU-T Recommendation X.5091ISO/IEC 9594-8: Information Technology-open Systems Interconnection-the Directory: Public-key and Attribute Certificate Frameworks. 1995
5[4]Service by e-Contract-a Security Model for Authentication, Aecess Control and Online Subscription Management in Multi-service-multi Provider Architectures. www.nue.et-inf. uni-siegen.de/~friesen/publications/
6[5]Oppliger R, Pernul G, Strauss C. Using Attribute Certificates to Implement Role-based Authorization and Access Controls. In Proceedings of the 4. Fachtagung Sicherheit in Informationssystemen (SIS 2000),2000:169-184
7[6]Chadwick D W. A X.509 Role-based Privilege Management Infrastructure. Busines Sbriefing: Global Info Security, 2002
8[7]Chadwick D W, Otenko A. RBAC Policies in XML for X.509 Based Privilege Management. http//sec.isi.salford.ac.uk/download/ Sec2002Final l.pdf,2002
9Martinez A M. Recognizing imprecisely localized,partially occluded, and expression variant faces from a single sample per class[J]. IEEE Trans. on PAMI, 2002,24(6):748-763.
10RSA Laboratories. Understand Public Key Infrastructure[M]. RSA Security Inc.,1999.