[1].Ruixuan Li, Zhuo Tang, Zhengding Lu, Jinwei Hu. Request-Driven Role Mapping Framework for Secure Interoperation in Multi-Domain Environments. International Journal of Computer Systems Science and Engineering, CRL Publishing, 2008, 23(3): 193-207
[2].LI Rui-xuan, HU Jin-wei, TANG Zhuo, LU Zheng-ding. R2BAC: A risk-based multi-domain secure interoperation model. Journal on Communications, 2008, 29(10): 58-69 (Chinese)
[3].Yu Guangcan, Li Ruixuan, Lu Zhengding, Mudar Sarem, Song Wei, Su Yonghong. Multi-Level Access Control Model for Tree-Like Hierarchical Organizations. Journal of Southeast University (English Edition), 2008, 24(3): 393-396
[4].Jianfeng Lu, Ruixuan Li, Zhengding Lu, Bing Li. Integrating Trust and Role for Secure Interoperation in Multi-Domain Environment. Proceedings of the 2nd International Conference on Information Security and Assurance (ISA 2008), IEEE Computer Society, Busan, Korea, April 2008, pp. 77-82
[5].YU Guang-can, LI Rui-xuan, LU Zheng-ding, SONG Wei, TANG Zhuo. Research on Locale Based Distributed Authorization Model in Workflow System. Computer Science, 2008, 35(11): 232-236 (Chinese)
[6].YU Guang-can, LI Rui-xuan, LU Zheng-ding, SONG Wei, TANG Zhuo. Feature Based Spatial Data Access Control Model Research. Computer Science, 2008, 35(10): 122-126 (Chinese)