期刊文献+

基于工作流基础上煤炭资源管理信息模型的设计研究

Research of Design for Management Information Model of Coal Resources Based on Workflow
下载PDF
导出
摘要 建立面向煤炭资源管理的现代化信息管理工作流模型,就是将现代化的信息技术、计算机以及电子信息技术等系列的科技手段综合应用于煤炭资源的监督管理体系中,从而实现对煤炭资源准确、高效及实时管理的目标。文中,对工作流的概念以及煤炭资源业务管理工作进行了介绍,并以Petri网为基础初步构建了煤炭资源信息化管理的工作流模型图,在此基础上,以E-R联系为支撑对煤炭资源信息化数据的组织进行了探讨,以期对当前煤炭资源的管理有所借鉴。 Building workflow model for the modem information management means to apply the modem information technology, computers and electronic information technology to the supervision and manage- ment system of the coal resources in order to realize the goal of managing the coal resources accurately, high - efficiently and timely. In this paper, firstly introduces the concepts of the workflow and the busi- ness management of the coal resources. And then build the workflow model of the information manage- ment towards the coal resources based on the Petri network. On the basis of this, this paper also discus- ses the organization of the information data of the coal resources with the support of the E - R relation in order to orovide the reference for the management of the coal resources.
作者 张谛
出处 《煤炭技术》 CAS 北大核心 2013年第1期267-269,共3页 Coal Technology
关键词 工作流 煤炭资源 信息管理 模型 workflow coal resources information management model
  • 相关文献

参考文献5

二级参考文献20

  • 1李兵,薛劲松,朱云龙,王扶东.基于规则的客户关系管理系统建模方法[J].东南大学学报(哲学社会科学版),2002,4(S2):103-105. 被引量:2
  • 2林香民.矿井通风系统模糊综合评价法[J].煤矿安全,1985,(12):23-28.
  • 3WFMC.TC00-1019:Workflow Management Coalition Workflow Security Considerations White Paper.1998.
  • 4Ravi S Sandhu et al.Role-based Access Control Models[J].IEEE Computer, 1996; 38-47.
  • 5Savith Kandala,Ravi Sandhu.Secure Role-Based Workflow Models. http ://www.list.gmu.edu/confrnc/ifi p/i01-rbwm.pdf.
  • 6Vijayalakshmi Atlurl ,Wei-Kuang Huang.An Authorization Model for Workflows[C].In :Proc of the Fifth European Symposium on Research in Computer Security, 1996.
  • 7Vijayalakshmi Atlufi ,Wei-Kuang Huang.A Petri Net Based Safety Analysis of Workflow Authorization Models[J].Journal of Computer Security, 1999.
  • 8Bertino E,Bonatti PA,Ferrari E.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information and System Security,2001 ;4(3) : 191-223.
  • 9Ravi S Sandhu.Separation of Duties in Computerized Information Systems[C].In:Sushil Jajodia,Carl Landwehr eds.Database Security, IV:Status and Prospects,North Holland,1991:179-189.
  • 10Nabil R Adam, Vijayalakshmi Atluri, Wei-Kuang Huang.Modeling and Analysis of Workflows Using Petri Nets[J].Journal of Intelligent Information Systems, 1998; 10(2) : 1-29.

共引文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部