3Barka E, Sandhu R. Framework for role-based delegation models [ C ]//Proceedings of the I6th Annum Computer Security Applications Confer- ence. Washington D C : IEEE Computer Society,2000 : 168-176.
4Zhang L H, Ahn G J, Chu B T. A rule-based framework for role-based delegation[ C]//Proceedings of the 6th ACM Symposium on Access Con- trol Models and Technologies. New York : ACM Press,2001 : 153-162.
5Zhang X W, Oh S, Sandhu R. PBDM:A flexible delegation model in RBAC [ C 1//Proceedings of the 8th ACM Symposium on Access Control Models and Technologies. New York:ACM Press,2003:149-157.
6A hn G, Sandhu R. Role-based authorization constraints specification [J]. A CM Transactions on Information and Systems,2000,3 (4) :207-226.
7Kuhlmann M, Shohat D, Schimpf G. Role mining-revealing business roles for security administration using data mining technology[ C ]//Proceed- ings of the 8th ACM Symposium on Access Control Models and Technologies. Como: ACM Press,2003 : 179-186.
8Zhang D N, Rartlamohanarao K, Ebringer T. Role engineering using graph optimisation [ C ]//Proceedings of the 12th ACM Symposium on Ac- cess Control Models and Technologies. Sophia Antipolis:ACM Press,2007:139-144.
9V aidya J, Atluri V, Guo Q. The role mining problem :finding a minimal description set of roles [ C ]//Proceedings of the 12th A CM Symposium on Access Control Models aml Technologies. Sophia Antipolis : ACM Press,2007 : 175-184.
10Molloy I, Chen H, Li T C, et al. Mining roles with semantic meanings [ C ]//Proceedings of the 13 th ACM Symposium on Access Control Models and Technologies. Estes Park: ACM Press ,2008:21-30.