Research on the role-based interorganizational workflow

被引:0
|
作者
Zhao, Wei-Dong
Dai, Wei-Hui
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A tool for role-based chatting
    Zhu, Haibin
    Alkins, Rob
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2505 - 2510
  • [42] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [43] Role-based infrastructures for agents
    Cabri, G
    [J]. EIGHTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 210 - 214
  • [44] Role-Based Systems are Autonomic
    Zhu, Haibin
    [J]. PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2008, : 144 - 152
  • [45] Delegation in a role-based organization
    Pacheco, O
    Santos, F
    [J]. DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
  • [46] Constrained role-based delegation
    Zhang, LH
    Ahn, GJ
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
  • [47] Role-based security policy
    Ma, Jianping
    Yu, Xiangxuan
    Hong, Fan
    Zhang, Jiangling
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450
  • [48] Role-based measurement of performance
    Murdoch, J
    Fernandes, KJ
    Astley, K
    [J]. INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 1586 - 1591
  • [49] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    [J]. DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [50] Research and Implemention of File Protection System Based on Improved Role-Based Access Control
    Ke, Gang
    Ling, Jie
    Hao, Yanjun
    Liao, Hongqi
    Yang, Zhaoxia
    [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 242 - +