1. Secure computer systems: unified exposition and multics interpretation;Bell,1975
2. Protection;Lampson,1971
3. Role-based access control in oracle7 and trusted oracle7;Notargiacomo,1995
4. Netware 4 as an example of role-based access control;Epstein,1995
5. Role-based access control in Java;Giuri,1998