[1] |
Wang Shao-qin. Thoughts on extracurricular learning activities [J]. Journal of PLA University of Foreign Languages,2000,23(6):70-72.(in Chinese)
|
[2] |
Liu Bing. Research on improvement of second class training mode [J]. China Higher Education,2009(18):59-60.(in Chinese)
|
[3] |
Zhong Hua, Feng Yu-lin, Jiang Hong-an. A role hierarchy model for role-based access control and its application [J]. Journal of Software,2000,11(6):779-784.(in Chinese)
|
[4] |
Deng Yong,Chen Jian-gang,Wang Ru-chuan,et al. Authorization delegation mechanism based trust level in grid computing [J]. Journal on Communications,2008,29(9):10-17.(in Chinese)
|
[5] |
Deng Wen-yang, Zhou Zhou-yi. A flexible RBAC model based on trust in open system[C]∥Proc of the 3rd Global Congress on Intelligent System (GCIS),2012:400-404.
|
[6] |
Botha R A. Separation of duties for access control enforcement in workflow environment[J]. IBM System Journal,2001,40(3):666-682.
|
[7] |
Sandhu R S. Role based access control models [J]. IEEE Computer,2006,29(2):38-47.
|
[8] |
Ferraiolo D,Kuhn D R. Role based access control[C]∥Proc of the 15th National Computer Security Conference, NIST/NSA,2002:1.
|
[9] |
Gil Y, Deelman E. Examining the challenges of scientific workflows [J]. IEEE Computer,2007,40(12):24-32.
|
[10] |
Chen Dan, Wang Yong, Wang Ying. Research and implementation of research collaboration platform based on workflow [J]. Computer Engineering and Design,2014,35(3):791-797.(in Chinese)
|
[11] |
Wang Huai-qing,Zeng Qing-tian. Modeling and analysis for workflow constrained by resources and nondetermined time:An approach based on Petri nets[J]. IEEE Transactions on System,Man and Cybernetics,2008,38(4):802-817.
|
|
附中文参考文献:
|
[1] |
王绍钦. 对第二课堂活动定位的思考[J]. 解放军外国语学院学报,2000,23(6):70-72.
|
[2] |
刘兵. 完善高校第二课堂培养模式研究[J]. 中国高等教育,2009(18):59-60.
|
[3] |
钟华,冯玉琳,姜洪安. 扩充角色层次关系模型及其应用[J]. 软件学报,2000,11(6):779-784.
|
[4] |
邓勇,陈建刚,王汝传,等. 网格计算环境的一种基于信任度的授权委托机制[J]. 通信学报,2008,29(9):10-17.
|
[10] |
陈丹,王勇,王瑛. 基于工作流的科研协同平台的研究与实现[J]. 计算机工程与设计,2014,35(3):791-797.
|