[1] Sandhu Ravi S, Coynek Edward J, Feinsteink Hal L, et al.Role-based access control models [J].IEEE Computer, 1996, 29(2):38-47.
[2] Jajodia S, Samarati P, Sapino M, et al.Flexible support for multiple access control policies [J].ACM Transactions on Database Systems, 2001, 26(2):214-260.
[3] Baader F, Calvanese D, McGuinness D, et al.The description logic handbook:theory, implementation and applications [M].London:Cambridge University Press, 2003:47-100.
[4] Jajodia S, Samarati P, Subrahmanian V S.A Logical Language for Expressing Authorizations[C]//Proceedings of the IEEE Symposium on Security and Privacy.Washington, DC:IEEE Computer Society Press, 1997:31-42.
[5] Moses T.eXtensible access control markup language(XACML)[EB/OL].(2003-02-18)[2007-04-20].http://www.oasis-open.org/committees/download.php/2406/oasis-xacml-1.0.pdf.
[6] Joshi J B D.Access-control language for multidomain environments[J].IEEE Internet Computing, 2004, 8(6):40-50.
[7] Uszok A, Bradshaw J, Jeffers R, et al.KAoS policy and domain services:toward a description-logic approach to policy representation, deconfliction, and enforcement[C]//Proc of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks.Washington, DC:IEEE Computer Society, 2003:93-96.
[8] Kagal L, Finin T, Joshi A.A policy language for pervasive systems[C]//Proc of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks.Washington, DC:IEEE Computer Society, 2003:63-71.
[9] Mike D.OWL web ontology language reference.W3C Recommendation 10 February 2004[EB/OL].(2004-02-10)[2007-04-20].http://www.w3.org/TR/owl-ref/.
[10] Wang Zhigang, Wang Xiaogang, Lu Zhengding, et al.OntoRBAC:specify and integrate RBAC policies with ontologies[J].Computer Science, 2007, 34(2):82-85.(in Chinese)