2Thomas R K , Sandhu R S . Conceptual Foundation for a Model of a task-based Authorization[A] . Proc of the 7th IEEE Computer Security [C] . Franconia : NH,Foundation Workshop, 1994,66-79.
3Condell M, Lynn C, Zao J. Security Policy Specification Language[R].Internet Draft, 1999-07.
4Sanchez L A, Condell M N. Security Policy Protocol[R]. Internet Draft, 1999-07.
5Pereira R, Bhattacharya R IPSec Policy Data Model[R]. Internet Draft, 1998-02.
6Sanchez L A, Condell M N. Security Policy System[R], Internet Draft,1998-11.
7Sandhu R, Samarati E Access Control: Principles and Practice[J].IEEE Communication Magazine, 1994, 32(9): 40-48.
8Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based Access Control Models[J]. IEEE Computer, 1996, 29(2):38-48.
9Object Management Group. Common Secure Interoperability V2 Specification[R]. 2001-04.
10Kent S, Atkinson R. Security Architecture Ibr the Internet Protocol[S].RFC2401, 1998.