-
1
-
-
0021194887
-
The viable system model: Its provenance, development, methodology and pathology
-
S. Beer, "The viable system model: Its provenance, development, methodology and pathology", Journal of Operational Research Society, 1984, 35(1) pp.7-25.
-
(1984)
Journal of Operational Research Society
, vol.35
, Issue.1
, pp. 7-25
-
-
Beer, S.1
-
2
-
-
84968814409
-
A framework for object-oriented on-line analytic processing
-
Washington, USA
-
J.W. Buzydlowski, I.Y. Song, and L. Hassel, "A Framework for Object-Oriented On-Line Analytic Processing", DOLAP'98: ACM First International Workshop on Data Warehousing and OLAP, Washington, USA, 1998.
-
(1998)
DOLAP'98: ACM First International Workshop on Data Warehousing and OLAP
-
-
Buzydlowski, J.W.1
Song, I.Y.2
Hassel, L.3
-
3
-
-
0003752388
-
-
Wiley
-
R. Espejo, W. Schuhmsnn, and M. Schwaninger, "Organizational Transformation and Learning, Cybernetic Approach to Management", Wiley, 1996.
-
(1996)
Organizational Transformation and Learning, Cybernetic Approach to Management
-
-
Espejo, R.1
Schuhmsnn, W.2
Schwaninger, M.3
-
4
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
February
-
D.F. Ferrailo, J.F. Barkley, and D.R. Kuhn, "A role-Based Access control Model and reference implementation within a corporate intranet", ACM Transaction on Information System Security, February 1999, Vol. 2(1) pp.34-64.
-
(1999)
ACM Transaction on Information System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferrailo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
7
-
-
0010536874
-
An organic knowledge information management architecture
-
Santa Barbara, USA
-
T. Karran, G.R. Ribeiro Justo and J. Zemerly, "An Organic Knowledge Information Management Architecture", International Conference on Intelligent Systems and Control, Santa Barbara, USA, 1999.
-
(1999)
International Conference on Intelligent Systems and Control
-
-
Karran, T.1
Ribeiro Justo, G.R.2
Zemerly, J.3
-
8
-
-
84961354851
-
Enterprise security architecture
-
Management: Policy, Standards and Organization
-
W.H. Murray, "Enterprise Security Architecture", Handbook of Information Security Management: Policy, Standards and Organization, 1998.
-
(1998)
Handbook of Information Security
-
-
Murray, W.H.1
-
10
-
-
0032593795
-
An architectural application framework for evolving distribute systems. Journal of systems architecture
-
G.R. Ribeiro Justo, and P. Cunha, "An Architectural Application Framework for Evolving Distribute Systems. Journal of Systems Architecture", Special Issue on New Trends in Programming and Execution Model for Parallel Architectures, Heterogeneous Distributed Systems and Mobile Computing, 1999, Vol. 45, pp. 1375-1384.
-
(1999)
Special Issue on New Trends in Programming and Execution Model for Parallel Architectures, Heterogeneous Distributed Systems and Mobile Computing
, vol.45
, pp. 1375-1384
-
-
Ribeiro Justo, G.R.1
Cunha, P.2
-
11
-
-
0010536362
-
Security moving from database systems to ERP systems
-
IEEE CS Press
-
R. van de Riet. and W. Janssen, "Security Moving from Database Systems to ERP Systems", DEXA'98, IEEE CS Press, 1998, pp. 273-280.
-
(1998)
DEXA'98
, pp. 273-280
-
-
Van de Riet, R.1
Janssen, W.2
-
12
-
-
0028513932
-
Access controls: Principles and practice
-
September
-
R. Sandhu and P. Samarati, "Access controls: Principles and practice", IEEE Communication, September 1994 Vol. 32(9).
-
(1994)
IEEE Communication
, vol.32
, Issue.9
-
-
Sandhu, R.1
Samarati, P.2
-
13
-
-
0000052619
-
Authentication, access control and audit
-
R. Sandhu, and P. Samarati, "Authentication, Access Control and Audit", ACM Computing Surveys, 1996, Volume 28(1), pp. 241-243.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.1
, pp. 241-243
-
-
Sandhu, R.1
Samarati, P.2
-
16
-
-
0001549660
-
The ARBAC 97: Model for role-based administrative of roles
-
February
-
R. Sandhu, V. Bhamidipppati, and Q. Munawer, "The ARBAC 97: Model for Role-Based Administrative of Roles", ACM Transaction on Information System Security, February 1999, Vol. 2(1), pp. 105:135.
-
(1999)
ACM Transaction on Information System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipppati, V.2
Munawer, Q.3
|