F. David, D. R. Ferraiolo, and . Kuhn, Ramaswamy Chandramouli.Role-Based Access Control, 2007.

. Ravis, . Sandhu, . Edwardj, H. Coyne, . Feinstein et al., Role-Based Access Control Models, IEEE Computer, vol.29, pp.38-47, 1996.

E. Michael, G. Shin, and . Ahn, UML-Based Representation of Role-Based Access Control, IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'00), pp.195-200, 2000.

Z. Wei, Research on Role-Based Access Control and ITS Application in Court System, 2003.

Y. Liaofei, The Application of Role-Based Access Control Technology in Union Equipment Management Center System, 2007.

X. Jianrui and C. Dan, Research of Permission Management Based on Role and Discretionary Access Control, Software Guide, pp.160-162, 2010.

Z. Yang, Research and application of Role-Based Access Control in Privilege Management, Microcomputer Information, pp.9-329, 2006.

Y. Fan and Z. Bo, RBAC Based Classified Application System Access Control Method Design[A].The Paper Collection of 2012 MIS / S & A Academic Conference, pp.182-185

W. Zhuo and F. Shan, Specify RBAC Constraints Using Object Constraint Language, Computer Engineering and Applications, vol.39109, issue.21, pp.100-102, 2003.

Z. Hong-qi, Z. Jing, and Z. Bin, Research of Extension of Static Constraints Mechanism in RBAC Model, Journal of Beijing University of Posts and elecommunications, issue.3, pp.31123-127, 2008.

D. Guang-yu, Q. Si-han, and L. Ke-long, Role-Based Authorization Constraint with Time Character[ J], Journal of Software, vol.13, issue.8, pp.1521-1527, 2002.

. Wu-xian, Web Applications of Role-Based Access Control, 2002.

F. Jin-sheng, G. Bao-can, and L. Xiao-dong, Design of extended role-based access control model and its implementation, Computer Engineering and Design, vol.29, issue.18, pp.4178-4721, 2008.