期刊文献+

工作流中资源的形式化建模 被引量:1

Formalization modeling of resources among workflow
下载PDF
导出
摘要 虽然人们为了使工作流管理完全计算机化付出了巨大的努力,但结果表明,这一目标即使在技术高度发达的今天,乃至可预见的未来也是不可能实现的,组成工作流的很多任务还只能由人来完成。首先对工作流中资源(主动资源)的分类方式进行讨论并把它们统一成一个资源元模型,然后给出了一个基于用户资格和特征的资源建模形式化描述。 Although people work hard to completely computerize workflow management, the result shows that this goal can not be realized in nowadays with highly developed technique or even in the foreseeable future. Many tasks which constitute a workflow still need to be executed by users. This paper first discusses the classification of resources among workflow and unifies them into a resource meta model, then presents a formalization description of resources modeling based on user's qualifications and characteristics.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第14期219-221,241,共4页 Computer Engineering and Applications
基金 中南民族大学自然科学基金(the South-Central University for Nationalities Natural Science Foundation of China under Grant No.YZZ07008)
关键词 工作流 资源 形式化建模 workflow resources formalization modeling
  • 相关文献

参考文献8

  • 1Casati F, Grefen P,Pemici B,et al. WIDE :workflow model and architecture,96-19 [ R ]. CTIT, University of Twente, 1996.
  • 2Du Wei-min,Davis J, Huang Yan-nong,et al. Enterprise workflow resource management,HPL-1999-8 [ R]. HP Laboratories Palo Alto, 1999-01.
  • 3Bichler P. Conceptual design of secure workflow systems [ D ]. Linz, 1998.
  • 4Ferraiolo D, Cugini J A, Kuhn R. Role - based access control : features and motivations[ C]//Su S. Proceedings of 11th Annual Computer Security Applications Conference. New Orleans, Los Alamitos: IEEE Computer Soc, 1995 : 554-563.
  • 5马建平,余祥宣,洪帆,张江陵.基于角色的安全策略[J].计算机研究与发展,1998,35(5):447-450. 被引量:15
  • 6洪帆,何绪斌,徐智勇.基于角色的访问控制[J].小型微型计算机系统,2000,21(2):198-200. 被引量:43
  • 7Ferraiolo D F,Sandhu R,Guirila S,et al. Proposed NIST standard for role- based access control[ J ]. ACM Transactions on Information and System Security,2001,4 ( 3 ) :224-274.
  • 8Esswein W. Das Rollenmodell der Organisation : Die Berucksichtigung aufbaouorganisatorischer Regelungen in Untemehmensmodellen [ J]. Wirtschaftsin formatik ,35 (6) :551-561.

二级参考文献4

  • 1贺岚,硕士学位论文,1996年
  • 2.
  • 3D. D Clark,and D. R Wilson.A Comparison of commercial and military computer security policies[].IEEE Symposium on Computer Security and Privacy.1987
  • 4.Integrity in Automated Information Systems[]..1991

共引文献56

同被引文献6

引证文献1

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部