Author:
Lins Fernando,Damasceno Julio,Medeiros Robson,Sousa Erica,Rosa Nelson
Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference37 articles.
1. Activiti (2013) Activiti 5.15 User Guide. http://activiti.org/userguide/index.html . Last visit at 18 June 2014
2. Altuhhova O, Matulevicius R, Ahmed N (2013) An extension of business process model and notation for security risk management. Technical report. http://www.techrepublic.com/resource-library/whitepapers . Last visit at 08 June 2014
3. Apache Software Foundation (2009) Apache Rampart—Axis2 Security Model. http://ws.apache.org/rampart/ . Last visit at 3 May 2012
4. Apache Software Foundation (2008) Apache Orchestration Director Engine (ODE). http://ode.apache.org/ . Last visit at 3 May 2013
5. Appian (2014) Delivering value, security, and speed with BPM in the Cloud. http://www.appian.com/bpm-software/cloud-bpm.jsp . Last visit 14 July 2014
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献