Author:
Chou Shih-Chien,Hsu Wei-Chuan,Lo Wei-Kuang
Subject
Hardware and Architecture,Information Systems,Software
Reference59 articles.
1. Role-based authorization constraints specification;Ahn;ACM Transactions on Information and System Security,2000
2. Ahn, G.J., Sandhu, R., Kang, M., Park, J., 2000. Injecting RBAC to secure a web-based workflow system. In: Proceedings of the 5th ACM Workshop on Role-Based Access Control
3. Alonso, G., 1995. Exotica/FMQM: a persistent message-based architecture for distributed workflow management. In: Proceedings of IFIP WG8.1 Working Conference on Information Systems Development for Decentralized Organizations
4. Alonso, G., Agrawal, D., Abbadi, A.E., Mohan, C., 1997. Functionality and limitations of current workflow management systems. Available from
5. Avrilionis, D., Cunin, P.-Y., Fernstrom, C., 1996. OPSIS: a view mechanism for software processes which supports their evolution and reuse. In: Proceedings of the 18th ICSE, pp. 38–47
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A new research agenda for tool integration;Journal of Systems and Software;2007-09
2. Support Environment EPT;An Approach to Modelling Software Evolution Processes
3. Overview of Software Processes and Software Evolution;An Approach to Modelling Software Evolution Processes