Business software applications are designed to allow users to perform a number of tasks. In general, user interfaces for these applications are fixed such that for a particular user, the interface always contains the same controls and types of information. As a result, user interfaces tend to provide too many controls and too much information because the designers need to provide access to all of the controls the user may need. This results in a confusing using interface that includes too much information for the user and does not provide the user with guidance as to which tasks should be completed next.
The discussion above is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.
An adaptable user interface is formed based on a role assumed by a user and the identification of tasks in a process that need to be performed. For each role assumed by the user, a set of tasks assigned to the role is identified. Each task is evaluated to determine if it is an active task that needs to be performed in one or more processes. For each active task, an element is added to the user interface.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Embodiments are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with various embodiments include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, telephony systems, distributed computing environments that include any of the above systems or devices, and the like.
Embodiments may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Some embodiments are designed to be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules are located in both local and remote computer storage media including memory storage devices.
With reference to
Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus.
Computer 110 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 110. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. A basic input/output system 133 (BIOS), containing the basic routines that help to transfer information between elements within computer 110, such as during start-up, is typically stored in ROM 131. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 120. By way of example, and not limitation,
The computer 110 may also include other removable/non-removable volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
A user may enter commands and information into the computer 110 through input devices such as a keyboard 162, a microphone 163, and a pointing device 161, such as a mouse, trackball or touch pad. Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 120 through a user input interface 160 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A monitor 191 or other type of display device is also connected to the system bus 121 via an interface, such as a video interface 190. In addition to the monitor, computers may also include other peripheral output devices such as speakers 197 and printer 196, which may be connected through an output peripheral interface 195.
The computer 110 is operated in a networked environment using logical connections to one or more remote computers, such as a remote computer 180. The remote computer 180 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110. The logical connections depicted in
When used in a LAN networking environment, the computer 110 is connected to the LAN 171 through a network interface or adapter 170. When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173, such as the Internet. The modem 172, which may be internal or external, may be connected to the system bus 121 via the user input interface 160, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 110, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
Memory 204 is implemented as non-volatile electronic memory such as random access memory (RAM) with a battery back-up module (not shown) such that information stored in memory 204 is not lost when the general power to mobile device 200 is shut down. A portion of memory 204 is preferably allocated as addressable memory for program execution, while another portion of memory 204 is preferably used for storage, such as to simulate storage on a disk drive.
Memory 204 includes an operating system 212, application programs 214 as well as an object store 216. During operation, operating system 212 is preferably executed by processor 202 from memory 204. Operating system 212, in one preferred embodiment, is a WINDOWS® CE brand operating system commercially available from Microsoft Corporation. Operating system 212 is preferably designed for mobile devices, and implements database features that can be utilized by applications 214 through a set of exposed application programming interfaces and methods. The objects in object store 216 are maintained by applications 214 and operating system 212, at least partially in response to calls to the exposed application programming interfaces and methods.
Communication interface 208 represents numerous devices and technologies that allow mobile device 200 to send and receive information. The devices include wired and wireless modems, satellite receivers and broadcast tuners to name a few. Mobile device 200 can also be directly connected to a computer to exchange data therewith. In such cases, communication interface 208 can be an infrared transceiver or a serial or parallel communication connection, all of which are capable of transmitting streaming information.
Input/output components 206 include a variety of input devices such as a touch-sensitive screen, buttons, rollers, and a microphone as well as a variety of output devices including an audio generator, a vibrating device, and a display. The devices listed above are by way of example and need not all be present on mobile device 200. In addition, other input/output devices may be attached to or found with mobile device 200.
A customer model is used to associate tasks in a process with users in an organization. Using these associations and keeping track of progress through the processes, a user interface is adapted to provide a user with those tasks that are relevant to the user while suppressing those tasks that are either not performed by the user, or are not available given the progress through the process.
Each task in each process is assigned to a role, where a single role may encompass multiple tasks. For example, role 326 is responsible for performing tasks 316 and 318. Role 328 and 330 perform tasks 322 and 320, respectively.
Each user in the organization such as users 332 and 334 assume one or more roles. For instance, user 332 assumes role 236 and user 334 assumes roles 328 and 330. Through the assumption of these roles, each user is assigned the tasks associated with those roles by default. As discussed further below, this default assignment of tasks can be modified through user-specific settings.
In step 500, a request to display a homepage is received. This request includes an identification of the user for whom the homepage is being generated. At step 502, a homepage generation unit 406 retrieves roles 408 stored in user settings 410 that have been associated with the user. At step 504, homepage generation unit 506 identifies tasks associated with the roles using roles-to-task mapping 412. Roles-to-task mapping 412 provides a list of the tasks that have been associated with a role in the customer model.
At step 506, the task list created from the roles is modified based on a set of blocked tasks 414 in user settings 410. Blocked tasks are tasks that would normally be assigned to the user based on their roles but that are blocked based on the skill level of the user or based on the size of the department or organization. For instance, in very large organizations, tasks tend to be more specialized so that a group of tasks that are placed within a role may be divided among several users that assume the role. For example, if a role contained two tasks, one user who assumes the role may perform the first task while another user who also assumes the role may perform the second task.
At step 508, homepage generation unit 406 determines which tasks in the modified task list are active. This determination is made by consulting process tracking 416, which lists tasks that need to be performed. Process tracking 416 updates the tasks that need to be performed by removing tasks after they are performed and adding the next task in the process description. Tasks do not become active until they can be performed. Thus, if other tasks must be performed or some information is needed before a task can be performed, it would not be designated as an active task by process tracking 416.
At step 510, homepage generation 406 adds activity page links to the homepage user interface for each of the user's roles that have at least one active task. Each activity page is associated with a particular role in a role-to-activity page mapping 426. An activity page is a user interface that displays a set of tasks or links to a set of tasks that are associated with a role.
At step 512, homepage generation 406 adds links for each of a set of added tasks 428 that are found in user settings 410 and that are active. Added task 428 represents tasks outside of the roles that have been assigned to the user. These added tasks can be temporary tasks that have been assigned to the user to overcome a change in personnel or can be a tailored modification that assigns a task normally associated with another role to a particular user who does not assume that role.
At step 514, homepage generation 406 consults user preferences 430 to identify links and data that the user has requested be displayed in their homepage. The data displayed can include key performance indicators related to the roles assumed by the user as well as key performance indicators that the user finds interesting but that are not normally associated with their roles.
At step 516, homepage generation 406 generates homepage user interface 400 by displaying the task links, the activity page links, the user preference links, and the user preference data.
Under various embodiments, each activity page is also an adaptable user interface that has its contents change depending on the roles performed by the user, the user's preferences, and the stage of various processes that the user is involved with. In
In step 700 of
At step 702, activity page generation unit 432 identifies data associated with the active tasks. This can be done by consulting a task-to-data mapping 434 of
At step 706, activity page generation unit 432 displays activity page 402 by displaying all of the task links for the active tasks associated with the role and the data associated with those tasks and the data requested in the user preferences. In other embodiments, instead of providing task links in the activity page, task areas are provided in which the user may perform the task without opening another page.
The activity page of
Because the activity page of
Selecting one of the task links causes a task user interface to be shown such as the task user interface of
After the user has submitted invoices for approval, process tracking unit 416 will update its process data for the invoices that were submitted for approval and advance them to the next task in the process.
Because the user interfaces are adapted based on a stage of processing, the user interfaces are driven by the process definitions. If a task is deleted from a process, the task will be omitted from the activity page automatically since process tracking 416 will never indicate that the deleted task is active. If tasks are reorganized such that a task is moved from one role to another, the user interfaces for the users associated with those roles will automatically be updated. For example, a user who loses a task under one of their roles will have that task automatically deleted from the activity page since roles-to-task mapping 412 will no longer indicate that this is a possible task to be displayed in an activity page. For the user that gained a task in one of the roles, role-to-task mapping 412 will now show this as a possible task for that role.
The present invention also permits easy integration of new tasks into processes.
At step 1000 of
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
The present application is a continuation of and claims priority from U.S. patent application Ser. No. 11/233,881 filed on Sep. 23, 2005, which claims priority benefit to U.S. Provisional Application 60/658,130 filed on Mar. 3, 2005.
Number | Name | Date | Kind |
---|---|---|---|
5765140 | Knudson et al. | Jun 1998 | A |
5911143 | Deinhart et al. | Jun 1999 | A |
6023765 | Kuhn | Feb 2000 | A |
6067548 | Cheng | May 2000 | A |
6088679 | Barkley | Jul 2000 | A |
6101481 | Miller | Aug 2000 | A |
6130621 | Weiss | Oct 2000 | A |
6601233 | Underwood | Jul 2003 | B1 |
6678714 | Olapurath et al. | Jan 2004 | B1 |
6748582 | Chiles et al. | Jun 2004 | B1 |
6754820 | Scheidt et al. | Jun 2004 | B1 |
6775668 | Goel | Aug 2004 | B1 |
6797624 | Lee | Sep 2004 | B2 |
6850895 | Brodersen et al. | Feb 2005 | B2 |
6889113 | Tasker et al. | May 2005 | B2 |
6944622 | Mitchell et al. | Sep 2005 | B1 |
6968314 | White et al. | Nov 2005 | B1 |
7069219 | Meyer et al. | Jun 2006 | B2 |
7103914 | Focke et al. | Sep 2006 | B2 |
7110957 | Barnard et al. | Sep 2006 | B2 |
7113923 | Brichta et al. | Sep 2006 | B1 |
7149700 | Munoz et al. | Dec 2006 | B1 |
7155720 | Casati et al. | Dec 2006 | B2 |
7197740 | Beringer et al. | Mar 2007 | B2 |
7207004 | Harrity | Apr 2007 | B1 |
7260510 | Sumida | Aug 2007 | B2 |
7290256 | Anderson et al. | Oct 2007 | B2 |
7308334 | Tasker et al. | Dec 2007 | B2 |
7340469 | Alghathbar et al. | Mar 2008 | B1 |
7403989 | Beringer et al. | Jul 2008 | B2 |
7406432 | Motoyama | Jul 2008 | B1 |
7412399 | Racca et al. | Aug 2008 | B1 |
7418448 | Hensel et al. | Aug 2008 | B2 |
7463648 | Eppstein et al. | Dec 2008 | B1 |
7480867 | Racine et al. | Jan 2009 | B1 |
7484183 | Look et al. | Jan 2009 | B2 |
7516110 | Spector et al. | Apr 2009 | B2 |
7516476 | Kraemer et al. | Apr 2009 | B1 |
7529931 | Vasishth et al. | May 2009 | B2 |
7548925 | Bradlee et al. | Jun 2009 | B2 |
7569217 | Tikoo | Aug 2009 | B2 |
7610575 | Sproule | Oct 2009 | B2 |
7631255 | Weise et al. | Dec 2009 | B2 |
7640548 | Yu et al. | Dec 2009 | B1 |
7653934 | Joshi | Jan 2010 | B1 |
7669244 | Smith | Feb 2010 | B2 |
7703102 | Eppstein et al. | Apr 2010 | B1 |
7761905 | Kern | Jul 2010 | B2 |
7801755 | Doherty et al. | Sep 2010 | B2 |
7882537 | Okajo et al. | Feb 2011 | B2 |
7900152 | Nielsen et al. | Mar 2011 | B2 |
7917555 | Gottumukkala et al. | Mar 2011 | B2 |
7941336 | Robin-Jan | May 2011 | B1 |
7992190 | Mevissen et al. | Aug 2011 | B2 |
20010053991 | Bonabeau | Dec 2001 | A1 |
20020055924 | Liming | May 2002 | A1 |
20020156644 | Davies et al. | Oct 2002 | A1 |
20020156663 | Weber et al. | Oct 2002 | A1 |
20020165898 | Duffy et al. | Nov 2002 | A1 |
20030126136 | Omoigui | Jul 2003 | A1 |
20030204431 | Ingman | Oct 2003 | A1 |
20030225839 | Kopunovic et al. | Dec 2003 | A1 |
20040078776 | Moon et al. | Apr 2004 | A1 |
20040133876 | Sproule | Jul 2004 | A1 |
20040176980 | Bulitta et al. | Sep 2004 | A1 |
20040193428 | Fruchter et al. | Sep 2004 | A1 |
20040220843 | Walter | Nov 2004 | A1 |
20040267589 | Wallman | Dec 2004 | A1 |
20050034098 | DeSchryver et al. | Feb 2005 | A1 |
20050091093 | Bhaskaran et al. | Apr 2005 | A1 |
20050091260 | Carroll et al. | Apr 2005 | A1 |
20050138420 | Sampathkumar et al. | Jun 2005 | A1 |
20050198209 | Barrett | Sep 2005 | A1 |
20050209899 | King et al. | Sep 2005 | A1 |
20050209900 | Kettner et al. | Sep 2005 | A1 |
20050235223 | Arend et al. | Oct 2005 | A1 |
20050268244 | Vignet | Dec 2005 | A1 |
20050278655 | Sims | Dec 2005 | A1 |
20050283823 | Okajo et al. | Dec 2005 | A1 |
20060047723 | Pomponio | Mar 2006 | A1 |
20060085747 | Morgan | Apr 2006 | A1 |
20060200476 | Gottumukkala et al. | Sep 2006 | A1 |
20060200489 | Lowe et al. | Sep 2006 | A1 |
20060200771 | Nielsen et al. | Sep 2006 | A1 |
20060203849 | Bonar et al. | Sep 2006 | A1 |
20060287890 | Stead et al. | Dec 2006 | A1 |
20080148413 | Brown et al. | Jun 2008 | A1 |
Number | Date | Country |
---|---|---|
1 001 337 | May 2000 | EP |
Entry |
---|
Kumar, Satheesh, Role Based Security using Authorization Manager in Windows Server 2003 C-Sharpcorner.com, Jul. 10, 2006. |
McPherson, Dave, Role-Based Access Control for Multi-tier Applications Using Authorization Manager Microsoft TechNet, Jul. 31, 2004. |
Prosecution documents associated with U.S. Appl. No. 11/233,881 including: Notice of Allowance mailed Oct. 20, 2010; Amendment filed Jul. 30, 2010; Office Action mailed Jun. 7, 2010; Amendment filed May 12, 2010; Final Office Action mailed Mar. 18, 2010; Amendment filed Dec. 23, 2009; Office Action mailed Sep. 24, 2009; Amendment filed Jul. 22, 2009; Advisory Action mailed Jul. 7, 2009; Examiner Interview Summary mailed on Dec. 24, 2008; Applicant's Summary of Interview filed on Dec. 12, 2008. |
Prosecution documents associated with U.S. Appl. No. 11/287,547 including: Amendment After Notice of Allowance filed on Feb. 15, 2011; Notice of Allowance mailed on Sep. 20, 2010; Amendment filed on Aug. 31, 2010; Applicant's Summary of Interview filed on Jul. 26, 2010; Final Rejection mailed on Jun. 10, 2010; Amendment filed on Mar. 8, 2010; Office Action mailed on Dec. 30, 2009; Amendment filed on Dec. 3, 2009; Final Rejection mailed on Aug. 18, 2009; Amendment filed on May 22, 2009; Office Action mailed on Feb. 23, 2009 and Applicant's Interview Summary mailed on Jan. 30, 2009. |
Prosecution documents associated with U.S. Appl. No. 11/345,965 including: Final Rejection mailed Aug. 13, 2012; Amendment filed Aug. 3, 2012; Amendment filed Apr. 14, 2011; Amendment filed Jan. 13, 2011; Office Action mailed Oct. 13, 2010; Amendment filed Sep. 14, 2010; Final Office Action mailed Aug. 3, 2010; Amendment filed Jul. 12, 2010; Office Action mailed Mar. 24, 2010. |
Anders, Morch, Tailoring tools for system development, Journal of End User Computing, vol. 10, No. 2, Spring 1998. |
Barka, Ezedin S., Framework for Role Based Delegation Models, George Mason University, Summer 2002. |
Cassidy, Anita, A Practical Guide to Information Systems Process Improvement, CRC Press, 2000. |
Cheong, Yu Chye et al., Frame-based Method for Customizing Generic Sofware Architecture, ACM, SSR'99, 1999. |
Collins et al., DataCore, “DataCore Limited requirement Specification for Procession the Windows ProcessFlow Product”, Issue 1.0, pp. 1-37, Feb. 27, 1996. |
Conspectus—The It Report for Decision Makers and Consultants, Conspectus, Sep. 1997, 2 pages. |
Crawford, Alan, “Hard Slog Starting to Pay Off for Data Core”, The Scotsman, Mar. 4, 1998, p. 1. |
Cuppens, Frederic et al., “Administration Model for Or-BAC” In International Federated Conferences (OTM'03), Workshop on Metadata for Security, 2003. |
Datacore Procession, “The Next Generation of Business Software”, 1 page (Date Unknown). |
Davis, William S., et al., The Information System Consultant's Handbook—Systems Analysis and Design CRC Press, Dec. 1998. |
Dewan, Rajiv et al., Workflow Optimization Through Task Redesign in Business Informatin Processes International Conference on System Sciences, 1998. |
Harrington, James H., Business Process Improvement Workbook, McGraw-Hill, 1997, ISBN: 0-07-026779-0. |
Kalam, Anas Abou et al., Organization based access control Proceeding of the 4th International Workshop on Policies for Distributed Systems and Networks, IEEE, 2003. |
Kellett, Andy, “Business Process Management Research Paper, Procession V4.1”, Research and Advisory Services, Mar. 2002, pp. 1-8. |
Michael C. Greenbaum of Blank Rome LLP, Prior Work by Others Relevant to Microsoft Patent Applications, Sep. 2, 2008, 2 pages. |
Microsoft Soluctions Framework—White Paper, Microsoft, Jun. 2002. |
Oh, Sejong et al., A Model of Role Administration Using Organization Structure, SACMAT'02, 2002. |
Oh, Sejong et al., Enterprise Model as a Basis of Administration on Role-Based Access Control, IEEE, 2001. |
Oh, Sejong et al., Task-role based access control model, Information Systems, vol. 28, 2003. |
Procession, “Delivers Performance Management Through a Process Application Development Platform”, 1 page, Dec. 2004. |
Procession, “Exposure of the Global Stage 1196-2000 a Brief Resume by Procession”, CEO 1995-2000, 1 page (Date Unknown). |
Procession, “Procession Business Process Application Platform ‘Quick Start’ Guide”, pp. 1-59 (Date Unknown). |
Procession, Grant Management System, pp. 1-4 (Date Unknown). |
Procession, Process Management for the E-World, pp. 1-4 (Date Unknown). |
Procession, The Business Process System, Datacore, pp. 1-4 (Date Unknown). |
Ryan, Hugh W. et al., Netcentric Computing, Anderson Consulting, Auerback, 1998. |
Scheer, A.W., Business Process Engineering—The State of the Art of Business Process Redesign, Springer-Verlag, Second Edition, 1994. |
Smith, Mark, “Procession Drives a Process of Change for Business”, Jan. 24, 2004, Article ID: M04-04, pp. 1-2. |
Tatsiopoulos, I.P., Requirements Analysis of Production Manavement Software Systems, Computer Integrated Manufacturing Systems, Vo. 3, No. 4, Novermber 1990, Abstract. |
Thompson, Michael, “Business Porcess Management Technology Audit, Procession”, Butler Group Subscription Services, Mar. 2004, pp. 1-8. |
Prosecution Documents Associated with U.S. Appl. No. 11/287,547 including: Notice of Allowance mailed Dec. 28, 2010. |
Prosecution documents associated with U.S. Appl. No. 11/345,965 including: Jan. 31, 2011. |
Implementing Least Privilege at your Enterprise, SANS Institute, InfSec Reading Room, 2003. |
Principle of Least Privilege, Wikipedia.org, Retrieved Jan. 24, 2011. |
Role-Based Access Control for Multi-tier Applications Using Authorization Manage, Microsoft Tech Net, Jul. 31, 2004. |
Ruighaver, A.B., A Fresh Look at Small-Granularity Role Based Access Control ACIS 2001 Proceedings, 2001. |
CISA Review Manual, Segregation of Duties within Information Systems, CISA, 2005. |
Botha et al., Separation of Duties for Access Control Enforcement in Workflow Environments IBM, Systems Journal, vol. 40, No. 3, 2001. |
Ferrailo, A Role Based Access Control Model and Reference Implementation within a Corporate Interanet, ACM Transactions on Information and System Security, 1999. |
Moon et al., The Conflict Detection Between Permission Assignment Constraints in Role Based Access Control, CISC2005, 2005. |
Nyanchama et al., The Role Graph and Conflict of Internest, ACM Transactions on Information and Systems Security, vol. 2, No. 1, Feb. 1999. |
Prosecution documents associated with U.S. Appl. No. 11/345,965 including: Office Action mailed on May 4, 2012. |
Prosecution History for U.S. Appl. No. 11/233,881 including: Issue Notification dated Feb. 9, 2011 and Application filed Sep. 23, 2005, 36 pages. |
Prosecution History for U.S. Appl. No. 11/287,547 including: Issue Notification dated Mar. 9, 2011, Response to Notice of Allowance dated Feb. 23, 2011, Application filed Nov. 23, 2005, and Preliminary Amendment dated Nov. 23, 2005, 69 pages. |
Prosecution History for U.S. Appl. No. 11/345,965 including: Notice of Abandonment dated Mar. 20, 2013, Applicant Initiated Interview Summary dated Nov. 7, 2012, Interview Summary dated Nov. 2, 2012, Response to Election/Restriction dated Feb. 12, 2010, Requirement for Restriction/Election dated Jan. 14, 2010, and Application filed Feb. 2, 2006, 47 pages. |
Kellett Andy, “Business Process Management Research Paper, Procession V4.1”, Research and Advisoly Services, Mar. 2002. pp. 1-8. |
Principele of least privilege definition Wikipedia.org, retrieved Apr. 27, 2012. |
Number | Date | Country | |
---|---|---|---|
20110113358 A1 | May 2011 | US |
Number | Date | Country | |
---|---|---|---|
60658130 | Mar 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11233881 | Sep 2005 | US |
Child | 13009706 | US |