[1] Sandhu Ravi, Coyne Edward, Feinstein Hal, et al.Role-based access control models [J].IEEE Computer, 1996, 29(2):38-47.
[2] Bhatti R, Bertino E, Ghafoor A, et al.XML-based specification for web-services document security [J].IEEE Computer, 2004, 37(4):41-49.
[3] Joshi J, Bhatti R, Bertino E, et al.Access-control language for multi-domain environments [J].IEEE Internet Computing, 2004, 8(6):40-50.
[4] Godik Simon, Moses Tim, Anderson Anne, et al.OASIS extensible access control markup language(XACML)[EB/OL].(2005-12-02)[2008-02-12].http://www.oasis-open.org/committees/xacml/.
[5] Toktar E, Jamhour E, Maziero C.RSVP policy control using XACML [C]//Proc of POLICY’04. New York:IEEE Computer Society Press, 2004:87-98.
[6] Al-Kahtani Mohammad Abdullah.A family of models for rule-based user-role assignment[D].Fairfax:Department of Computer Science of George Mason University, 2003.