[1]ROSENBERRY W, KENNEY D, FISHER K. Understanding DCE [M]. O'Reilly and Associates Inc, 1993.
[2]Final Proposed Draft Amendment on Certificate Extensions(v6) [S]. ITUI,SO/IEC, 1999.
[3]ROSENTHAL A, WILLIAMS J, HERNDON W,et al. A fine grained access control model for object-oriented DBMSs, in Database Security [A], VIII: Status and Prospects [C]. Elsevier, Amsterdam, 1994.319-334.
[4]HAYTON RJ, BACON JM, MOODY K. Access Control in an Open Distributed Enviroment[A]. Proceeding of IEEE Symposium on Security and Privacy [C]. Oakland, CA, 1998.3-14.
[5]HAMILTON G, CATTELL R, FISHER M. JDBC Database Access With Java: A Tutorial and Annotated Reference [M]. Addison-Wesley, 1997.
[6]JAJODIA S, KOGAN B. Integrating an object-oriented data model with multilevel security [A]. Proceedings of the IEEE Symposium on Research in Security and Privacy[C], 1990.76-85.
[7]JONSCHER D, DITTRICH KR. Argos - A configurable access control system for interoperable environments, in Database Security [A]. IX: Status and Prospects[C]. Chapman and Hall, London, 1995.43-60. |