7Park J, Sandhu R. The UCONABC Usage Control Model[J]. ACM Trans. on Information and System Security, 2004, 7(1): 128-174, 200.
8Janicke H, Cau A. A Note on the Formalisation of UCON[C]// Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. [S.l]: ACM Press, 2007: 163-168.
9Katt B, Zhang Xinwen, Breu R. A General Obligation Model and Continuity: Enhanced Policy Enforcement Engine for Usage Control[C]//Proceedings of the 13rd ACM Symposium on Access Control Models and Technologies. [S.l.]: ACM Press, 2008: 123-132.