Font Size: a A A
Keyword [Authorization Constraint]
Result: 1 - 4 | Page: 1 of 1
1. Research On Key Security Techniques Of Web Service Composition
2. Research And Implement On Multi-Constrains Role-Based Access Control Mechanism
3. Research And Application Of Access Control And Authorization Constraint Based On Workflow
4. Research And Application Of Workflow Access Control Technology Faced The Rapid Extended Manufacturing System
  <<First  <Prev  Next>  Last>>  Jump to