1. G. J. Ahn, “Specification and classification of role-based authorization policies,” in Proceedings of 12th IEEE International Workshops on Enabling Technology: Infrastructure for Collaborative Enterprises, 2003.
2. M. A. Al-Kahtani and R. Sandhu, “Rule-based RBAC with negative authorization,” in Proceedings of 20th Annual Computer Security Applications Conference, 2004.
3. C. J. Anumba, O. O. Ugwu, L. Newnham, and A. horpe, “Collaborative design of structures using intelligent agent,” Automation in Construction, 11, 2002, pp. 89-123.
4. E. Barka and R. Sandhu, “Framework for role-based delegation models,” in Proceedings of 16th Annual Computer Security Applications Conference, 2000, pp. 168-176.
5. E. Barka and R. Sandhu, “Role-based delegation model/hierarchical roles(RBDM1),” in Proceedings of 20th Annual Computer Security Applications Conference, 2004, pp. 396-404.
6. F. Biennier and J. Favrel, “Collaborative business and data privacy: Toward a cyber-control?,” Computers in Industry, 56, Jan. 2005, pp. 361-370.
7. C. D. Cera, T. Kim, J. H. Han and W. C. Regli, “Role-based viewing envelopes for information protection in collaborative modeling,” Computer-Aided Design, 36, 2004, pp. 873-886.
8. X. Chu and Y. Fan, “Product data management based on web technology,” Integrated Manufacturing System, 10(2), 1999, pp. 8-84.
9. B. Eiderback and L. A. Jiarong, “Common notification service,” in Proceedings of OOGP’97, Sep. 1997.
10. C. A. Ellis, S. J. Gibbs and G. L. Rein, “Groupware: some issues and experiences,” Communications of the ACM, 34(1), 1991, pp. 38-58.
11. D. Georgakopoulos, M. Hornick and A. Sheth, “An overview of workflow management: from process modeling to workflow automation infrastructure,” Distributed and Parallel Database, 1995, pp. 375-387.
12. V. D. Gligor, S. I. Gavrila and D. Ferraiolo, “On the formal definition of separation-of-duty policies and their composition,” in Proceedings of IEEE Symposium on Security and Privacy, 1998.
13. L. A. Guerrero and D. A. Fuller, “A pattern system for the development of collaborative applications,” Information and Software Technology, 43, 2001, pp. 457-467.
14. Guest editorial, “XML schema and data management,” Data & Knowledge Engineering, 52, 2005, pp. 181-183.
15. T. Jaeger, A. Edwards and X. Zhang, “Managing access control policies using access control spaces,” in Proceedings of 7th ACM Symposium on Access Control Models and Technologies, 2002, pp. 3-12.
16. S. Jajodia, P. Samarati, M. Sapino and V. Subrahmanian, “Flexible support for multiple access control policies,” In ACM Transactions on Database Systems, 26(2), June 2001.
17. N. R. Jennings and M. J. Wooldridge, “Applications of intelligent agents,” In N. R. Jennings, M. J. Wooldridge, (eds.), Agent Technology: Foundations, Applications, and Markets, 1998, pp. 3-28.
18. T. Kim, C. D. Cera, W. C. Regli, H. Choo and J. H. Han, “Multi-Level modeling and access control for data sharing in collaborative design,” Advanced Engineering Informatics, 20, 2006, pp. 47-57.
19. T. Kvan, “Collaborative design: what is it? ,” Automation in Construction, 9, 2000, pp.409-415.
20. B. Lampson, “protection,” in Proceedings of Fifth Annual Princeton Conference of Information Sciences and Systems, 1971, pp.43-437.
21. DB Lange and M. Oshima, “Mobile agents with java: the aglet API,” World Wide Web, 3(1), 1998, pp. 111-121.
22. K. K. Leong, K. M. Yu and W. B. Lee, “A security model for distributed product data management system,” Computers in Industry, 50, 2003, pp. 179-193.
23. A. Lin and R. Brown, “The application of security policy to role-based access control and the common data security architecture,” Computer Communication, 23, 2000, pp.1584-1593.
24. D. R. Liu, M. Y. Wu and S. T. Lee, “Role-based authorizations for workflow systems in support of task-based separation of duty,” The Journal of Systems and Software, 73, 2004, pp. 375-387.
25. J. Liu and L. Sun, “The application of role-based access control in workflow management systems,” in Proceedings of 2004 IEEE International Conference on Systems, Man and Cybernetics, 2004, pp. 5492-5496.
26. L. Liu and H. Zhu, “Implementing agent evolution with roles in collaborative systems,”in Proceedings of 2006 IEEE International Conference on Networking, Sensing and Control, Apr. 2006, pp. 819-824.
27. T. Liu and X. W. Xu, “A review of web-based product data management systems,” Computers in Industry, 44, 2001, pp. 251-262.
28. M. L. Maher, A. Cicognani and S. Simoff, “An experimental study of computer mediated collaborative design,” International Journal of Design Computing, 1, 1998, pp. 10-20.
29. M. J. Moyer and M. Ahamad, “Generalized role-based access control,” in Proceedings of 21st International Conferences on IEEE Distributed Computing Systems, 2001, pp.391-398.
30. S. Murugesan, “Intelligent agents on the Interent and Web,” in Proceedings of 1998 IEEE Region 10 International Conference on Global Connectivity in Energy, 1, 1998, pp. 97-102.
31. NIST, “Role Based Access Control (RBAC),” Apr. 2003,
http://csrc.nist.com/rbac/.
32. S. L. Osbom, R. S. Sandhu and Q. Munawer, “Configuring role-based access control to enforce mandatory and discretionary access control policies,” Information System Security, 3(2), 2003, pp. 85-106.
33. R. S. Sandhu and P. Sammarati, “Access control principles and practice,” IEEE Communication, 32(9), 1994, pp. 8-40.
34. R. S. Sandhu, E. J. Coyne, H. L. Feinstein and C. E. Youmn, “Role-based access control models,” IEEE Computer, 29(2), 1996, pp. 38-47.
35. W3C, “XML specification version 1.0,” Oct. 2000, http://www.w3.org/TR/2000/REC-xml-20001006.
36. C. Xu, H. Yan and F. Liu, “The implementation of role-based access control on the web,” in Proceedings of 2001 International Conference on IEEE Info-tech and Info-net, 4, 2001, pp. 251-255.
37. X. W. Xu and T. Liu, “A web-enabled PDM system in a collaborative design environment,” Robotics and Computer Integrated Manufacturing, 19, 2003, pp.315-328.
38. C. Yu, D. Ye, M. Wu and Y. Pan, “A role-based and agent-oriented model for collaborative virtual environment,” in Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 2, 2005, pp. 1592-1597.
39. H. Zhu, “A role-based conflict resolution method for a collaborative system,” in Proceedings of 2003 IEEE International Conference on Systems, Man and Cybernetics, 5, Oct. 2003, pp. 4135-4140.
[中文文獻]
1. K. Akio and M. Tora/周明憲譯,「打好基礎–學會UML 與Java 塑模的理論與實作」,博碩文化股份有限公司,2005 年4 月。
2. G. Booch, J. Rumbauch and I. Jacobson/張裕益譯,「UML 使用手冊」,博碩文化股份有限公司,2001 年10 月。
3. 林信成、龔裕民,「XML 與電子文件展示技術之探討」,淡江大學圖書與資訊學刊,第三十七期,58-78 頁,2001 年5 月。
4. 東海林誠、窪田寬之、板本篤、與橋本大輔/柯志杰譯,「學UML 的第一本書」,博碩文化股份有限公司,2003 年2 月。
5. 陳長念,「XML 入門與應用」,文魁資訊股份有限公司,2003 年4 月。
6. 黃敬仁、張瑞芬、姚銀河,「WfMC 為基之模組化網路協同設計系統分析與建置」,工業工程學刊,第四卷第二十期,422-432 頁,2003 年。7. 趙平宜,葉神丑,袁健仁等,「產品資料管理」,滄海書局,2001 年。
8. 劉興華、黃景彰、吳國禎、鄭智文、劉敦仁,「企業網路中整合使用者身分確認與執行權管制的資訊安全管理:一個系統設計的構想」,交通管理學報,第二卷第十九期,103-130 頁,1999 年。