1. Zheng Y, He D, Yu W, Tang X. Trusted computing-based security architecture for 4G mobile networks. In Proceedings of the Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2005, PDCAT 2005; 251-255.
2. Protection in operating systems;Harrison;Communications of the ACM,1976
3. The schematic protection model: its definition and analysis for acyclic attenuating schemes;Sandhu;Journal of the ACM,1988
4. Sandhu RS. The typed access matrix model. In Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1992; 122-136.
5. Ferraiolo D, Cugini J, Kuhn DR. Role based access control (RBAC): features and motivations. In Proceedings of 1995 Computer Security Applications Conference, December 1995; 241-248.