[1]SANDHU R.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.[2]SANDHU R,FERRAIOLO D,KUHN R.The NIST model for role-based access control:towards a unified standard[C]// RBAC'00:Proceedings of the 5th ACM Workshop on Role-Based Access Control.New York:ACM Press,2000:47-63.[3]RISSANEN E,AXIOMATICS A B.XACML v3.0 core and hierarchical Role Based Access Control (RBAC) profile v1.0[EB/OL].[2011-12-10].http://docs.oasis-open.org/xacml/3.0/xacml-3.0-rbac-v1-spec-cs-01-en.pdf.[4]BARKER S.Data protection by logic programming[C]// Proceedings of the First International Conference on Computational Logic,LNAI 1861.Berlin:Springer-Verlag,2000:1300-1314.[5]BARKER S,STUCKEY P J.Flexible access control policy specification with constraint logic programming[J].ACM Transactions on Information and System Security (TISSEC),2003,6(4):501-546.[6]FERRAIOLO D,ATLURI V,GAVRILA S.The policy machine:a novel architecture and framework for access control policy specification and enforcement[J].Journal of System Architecture,2011,57(4):412-424.[7]YAGUE M I,MANA A,LOPEZ J,et al.Applying the semantic Web layers to access control[C]// DEXA'03:Proceedings of the 14th International Workshop on Database and Expert Systems Applications.Washington,DC:IEEE Computer Society,2003:622-626.[8]KAGAL L,FININ T,JOSHI A.A policy language for a pervasive computing environment[C]// Proceedings of IEEE the 4th International Workshop on Policies.Washington,DC:IEEE Computer Society,2003:63-76.[9]USZOK,A,BRADSHAW J M,JEFFERS R,et al.KAoS policy and domain services:toward a description-logic approach to policy representation,deconfliction,and enforcement[C]// POLICY 2003:Proceedings of IEEE the 4th International Workshop on Policcies for Distributed Systems and Newworks.Washington,DC:IEEE Computer Society,2003:93-96.[10]王治纲,王晓刚,卢正鼎,等.OntoRBAC:基于本体的RBAC策略描述与集成[J].计算机科学,2007,34(2):82-85.[11]FININ T,JOSHI A,KAGAL L,et al.ROWLBAC:Representing role based access control in OWL[C]// SACMAT '08:Proceedings of the 13th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2008:73-82.[12]TONTI G,BRADSHAW J M,JEFFERS R,et al.Semantic Web languages for policy representation and reasoning:a comparison of KAoS,Rei,and Ponder[C]// ISWC 2003:Proceedings of the 2003 International Semantic Web Conference,LNCS 2870.Berlin:Springer-Verlag,2003:419-437.[13]MCGUINNESS D L,HARMELEN F.OWL Web ontology language overview[EB/OL].[2012-01-10].http://www.w3.org/TR/owl-features.[14]HORROCKS I,PATEL-SCHNEIDER,BOLEY H,et al.SWRL:A semantic Web rule language combining OWL and RuleML[EB/OL].[2012-01-20].http://www.w3.org/Submission/SWRL/.[15]HEBELER J,FISHER M,BALACE R,et al.Web 3.0与Semantic Web编程[M].唐富年,唐荣年,译.北京:清华大学出版社,2010.[16]叶春晓,符云清,吴中福.RBAC中权限扩展的实现[J].计算机工程,2005,39(2):141-142,172. |