An ontology-based approach to role-human assignment in human processes for knowledge intensive services
暂无分享,去创建一个
[1] Nicola Guarino,et al. Formal Ontology and Information Systems , 1998 .
[2] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[3] Ian Miles,et al. Knowledge intensive business services: prospects and policies , 2005 .
[4] Ninghui Li,et al. RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[5] P. Hertog,et al. Knowledge-intensive business services: users, carriers and sources of innovation , 1995 .
[6] Anthony C. Bloesch,et al. Data Modeling in UML and ORM: A Comparison , 1999, J. Database Manag..
[7] George A. Miller,et al. WordNet: A Lexical Database for English , 1995, HLT.
[8] Ravi S. Sandhu,et al. A model for attribute-based user-role assignment , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[9] Yuh-Min Chen,et al. Advanced multi-phase trust evaluation model for collaboration between coworkers in dynamic virtual project teams , 2009, Expert Syst. Appl..
[10] MengChu Zhou,et al. Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[11] MengChu Zhou,et al. Roles in Information Systems: A Survey , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[12] Jay Liebowitz,et al. Knowledge management and its link to artificial intelligence , 2001, Expert Syst. Appl..
[13] Amy L. Ostrom,et al. Client Co-Production in Knowledge-Intensive Business Services , 2002 .
[14] Robert P. Bostrom,et al. Role conflict and ambiguity: Critical variables in the MIS user-designer relationship , 1980, SIGCPR '80.
[15] Steve Pepper. Topic Maps , 2004 .
[16] M. Alvesson. Management Of Knowledge-Intensive Companies , 1995 .
[17] W. N. Borst,et al. Construction of Engineering Ontologies for Knowledge Sharing and Reuse , 1997 .
[18] Ravi S. Sandhu,et al. A model for role administration using organization structure , 2002, SACMAT '02.
[19] Yushi Komachi,et al. ISO/IEC JTC 1/SC 34 , 2006 .
[20] Emmanuel Muller,et al. What we should know about knowledge-intensive business services , 2009 .
[21] Ruth C. King,et al. The Impact of Socialization on the Role Adjustment of Information Systems Professionals , 1998, J. Manag. Inf. Syst..
[22] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[23] Lars Marius Garshol. tolog - A Topic Maps Query Language , 2005, TMRA.
[24] Asunción Gómez-Pérez,et al. Ontological Engineering: A state of the Art , 1999 .
[25] Blake E. Ashforth,et al. Role Transitions in Organizational Life : An Identity-based Perspective , 2001 .
[26] Human Interactions , 2007, Science.
[27] Haibin Zhu,et al. Role mechanisms in collaborative systems , 2006 .
[28] Ravi S. Sandhu,et al. The URA97 Model for Role-Based User-Role Assignment , 1997, DBSec.
[29] David W. Chadwick,et al. Role-Based Access Control With X.509 Attribute Certificates , 2003, IEEE Internet Comput..
[30] Natalia Juristo Juzgado,et al. Assigning people to roles in software projects , 2004, Softw. Pract. Exp..
[31] Pieter H. Hartel,et al. Dynamic User Role Assignment in Remote Access Control , 2009 .