1. He, X.-X.: Fingerprint access control in intelligent building application and implementation. Comput. Knowl. Technol. (2010)
2. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., et al.: Role-based access controls. Comput. Sci. 29(2), 38–47 (2003)
3. Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2), 85–106 (2000)
4. Liu, Z., Zou, Z.: A survey of aeneral temporal RBAC studying. J. Chongqing Normal Univ. 26(3), 69–71 (2009)
5. Song, L., Zhang, X., Lv, X.: The implementation of a new RBAC. Comput. Knowl. Technol. (2009)