TWI818798B - Method for permission management - Google Patents

Method for permission management Download PDF

Info

Publication number
TWI818798B
TWI818798B TW111142673A TW111142673A TWI818798B TW I818798 B TWI818798 B TW I818798B TW 111142673 A TW111142673 A TW 111142673A TW 111142673 A TW111142673 A TW 111142673A TW I818798 B TWI818798 B TW I818798B
Authority
TW
Taiwan
Prior art keywords
job
roles
permissions
permission
management system
Prior art date
Application number
TW111142673A
Other languages
Chinese (zh)
Other versions
TW202420183A (en
Inventor
陳維超
張明淇
魏智斌
吳卓叡
Original Assignee
英業達股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 英業達股份有限公司 filed Critical 英業達股份有限公司
Priority to TW111142673A priority Critical patent/TWI818798B/en
Application granted granted Critical
Publication of TWI818798B publication Critical patent/TWI818798B/en
Publication of TW202420183A publication Critical patent/TW202420183A/en

Links

Images

Landscapes

  • Vehicle Body Suspensions (AREA)
  • Sewing Machines And Sewing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for permission management includes following steps of: generating a plurality of job roles with different permissions according to an organization permission table by a management system; generating a first permission structure directed graph according to the plurality of job roles; selecting one of the plurality of job roles in the first permission structure directed graph as a target job role by the management system; generating a minimum directed spanning graph in the first permission structure directed graph according to the target job role by the management system; determining whether a permission and a job of each of the plurality of job roles in the first permission structure directed graph match by the management system; and adjusting the permission and the job of each of the plurality of job roles so as to generate a second permission structure directed graph if the permission and the job of each of the plurality of job roles in the first permission structure directed graph are determined to be in consistent by the management system.

Description

權限管理方法Rights management methods

本案涉及一種管理方法。詳細而言,本案涉及一種權限管理方法。This case involves a management approach. In detail, this case involves a rights management method.

現有權限管理系統有數百種報表,資訊部門通常依據公司人員需求開設報表管理權限。然而,資訊部門無法確定主管角色所擁有的權限是否大於他的下屬角色的所有權限。主管不知道有哪些是自己無法看到但下屬所能看到報表。因此,主管與下屬之間的資訊落差,將有可能會延宕主管下決策的時間。Existing permission management systems have hundreds of reports, and information departments usually set up report management permissions based on the needs of company personnel. However, the information department cannot determine whether the supervisor role has greater permissions than all of his subordinate roles. The supervisor does not know which reports he cannot see but which subordinates can see. Therefore, the information gap between supervisors and subordinates may delay the supervisor's decision-making time.

因此,上述技術尚存諸多缺陷,而有待本領域從業人員研發出其餘適合的權限管理方法。Therefore, the above-mentioned technology still has many shortcomings, and practitioners in the field need to develop other suitable rights management methods.

本案的一面向涉及一種權限管理方法。權限管理方法包含以下步驟:藉由管理系統根據組職權限表產生不同權限之複數個職位角色;藉由管理系統根據複數個職位角色以產生第一權限結構有向圖;藉由管理系統選取第一權限結構有向圖中之複數個職位角色的其中至少一者,以作為目標職位角色;藉由管理系統根據目標職位角色產生最小有向生成圖於第一權限結構有向圖中;藉由管理系統判斷第一權限結構有向圖中之複數個職位角色中的每一者之權限及職位是否相符;以及若第一權限結構有向圖中之複數個職位角色中的每一者之權限及職位被判定為不相符,則藉由管理系統調整複數個職位角色之權限及職位,藉以產生第二權限結構有向圖。One aspect of this case involves a rights management approach. The permission management method includes the following steps: using the management system to generate a plurality of job roles with different permissions based on the group job permission table; using the management system to generate a first permission structure directed graph based on the plurality of job roles; using the management system to select the first permission structure directed graph. At least one of the plurality of job roles in a permission structure directed graph is used as the target job role; the management system generates a minimum directed generated graph in the first permission structure directed graph according to the target job role; by The management system determines whether the authority and position of each of the plurality of job roles in the first authority structure directed graph are consistent; and if the authority of each of the plurality of job roles in the first authority structure directed graph If the positions are judged to be incompatible, the management system adjusts the permissions and positions of multiple job roles to generate a second permission structure directed graph.

以下將以圖式及詳細敘述清楚說明本案之精神,任何所屬技術領域中具有通常知識者在瞭解本案之實施例後,當可由本案所教示之技術,加以改變及修飾,其並不脫離本案之精神與範圍。The following will clearly illustrate the spirit of this application with drawings and detailed descriptions. Anyone with ordinary knowledge in the technical field, after understanding the embodiments of this application, can make changes and modifications based on the techniques taught in this application without departing from the spirit of this application. Spirit and scope.

本文之用語只為描述特定實施例,而無意為本案之限制。單數形式如“一”、“這”、“此”、“本”以及“該”,如本文所用,同樣也包含複數形式。The terms used herein are only used to describe specific embodiments and are not intended to be limiting. Singular forms such as "a", "this", "this", "this" and "the", as used herein, also include the plural forms.

關於本文中所使用之『包含』、『包括』、『具有』、『含有』等等,均為開放性的用語,即意指包含但不限於。The words "includes", "includes", "has", "contains", etc. used in this article are all open terms, which mean including but not limited to.

關於本文中所使用之用詞(terms),除有特別註明外,通常具有每個用詞使用在此領域中、在本案之內容中與特殊內容中的平常意義。某些用以描述本案之用詞將於下或在此說明書的別處討論,以提供本領域技術人員在有關本案之描述上額外的引導。Regarding the terms used in this article, unless otherwise noted, they generally have the ordinary meanings of each term used in this field, the content of this case, and the special content. Certain terms used to describe the present invention are discussed below or elsewhere in this specification to provide those skilled in the art with additional guidance in describing the present invention.

第1圖為根據本案一些實施例繪示的管理系統100之電路方塊示意圖。在一些實施例中,請參閱第1圖,管理系統100包含伺服器110及資料庫120。伺服器110耦接於資料庫120。Figure 1 is a schematic circuit block diagram of the management system 100 according to some embodiments of the present invention. In some embodiments, please refer to FIG. 1 , the management system 100 includes a server 110 and a database 120 . Server 110 is coupled to database 120 .

在一些實施例中,管理系統100之資料庫120用以儲存組職權限表。管理系統100之伺服器110用以根據組職權限表產生不同權限之複數個職位角色。管理系統100之伺服器110用以根據複數個職位角色以產生第一權限結構有向圖。In some embodiments, the database 120 of the management system 100 is used to store the group authority list. The server 110 of the management system 100 is used to generate a plurality of job roles with different permissions according to the group role permission table. The server 110 of the management system 100 is used to generate a first authority structure directed graph according to a plurality of job roles.

接著,請參閱第1圖,管理系統100之伺服器110用以選取第一權限結構有向圖中之複數個職位角色的其中至少一者,以作為目標職位角色。管理系統100之伺服器110用以根據目標職位角色產生最小有向生成圖於第一權限結構有向圖中。Next, please refer to Figure 1. The server 110 of the management system 100 is used to select at least one of a plurality of job roles in the first authority structure directed graph as the target job role. The server 110 of the management system 100 is used to generate a minimum directed generation graph in the first authority structure directed graph according to the target job role.

再者,管理系統100之伺服器110判斷第一權限結構有向圖中之複數個職位角色中的每一者之權限及職位是否相符。若第一權限結構有向圖中之複數個職位角色中的每一者之權限及職位被判定為不相符,則管理系統100之伺服器110用以調整複數個職位角色中的每一者之權限及職位,藉以產生第二權限結構有向圖。Furthermore, the server 110 of the management system 100 determines whether the authority and position of each of the plurality of job roles in the first authority structure directed graph are consistent. If the authority and position of each of the plurality of job roles in the first authority structure directed graph are determined to be inconsistent, the server 110 of the management system 100 is used to adjust the authority and position of each of the plurality of job roles. Authority and position, thereby generating a second authority structure directed graph.

第2圖為根據本案一些實施例繪示的權限管理方法200之步驟流程示意圖。在一些實施例中,為使本案權限管理方法200易於理解,請一併參閱第1圖至第8圖,上述第3圖至第8圖為根據本案一些實施例繪示的權限管理方法200之權限結構有向圖之示意圖。在一些實施例中,權限管理方法200可由第1圖之管理系統100所執行,而執行的相關操作方式可參閱第3圖至第8圖,詳述如後。Figure 2 is a schematic flowchart of the steps of the rights management method 200 according to some embodiments of this case. In some embodiments, in order to make the rights management method 200 in this case easy to understand, please refer to Figures 1 to 8 together. The above Figures 3 to 8 are examples of the rights management method 200 according to some embodiments of this case. Schematic diagram of a directed graph of permission structure. In some embodiments, the rights management method 200 can be executed by the management system 100 in Figure 1, and the relevant operation methods can be seen in Figures 3 to 8, as detailed below.

於步驟210中,根據組職權限表產生不同權限之複數個職位角色。In step 210, a plurality of job roles with different permissions are generated according to the group role permission table.

舉例而言,請參閱第1圖至第3圖,藉由管理系統100之伺服器110根據資料庫120之組職權限表產生不同權限之複數個職位角色(例如:職位角色A至職位角色G)。For example, please refer to Figures 1 to 3. The server 110 of the management system 100 generates a plurality of job roles with different permissions (for example: job role A to job role G) according to the job authority table of the database 120. ).

於步驟220中,根據複數個職位角色以產生第一權限結構有向圖。In step 220, a first authority structure directed graph is generated according to a plurality of job roles.

舉例而言,請參閱第1圖至第3圖,藉由管理系統100之伺服器110根據複數個職位角色(例如:職位角色A至職位角色G)以產生第一權限結構有向圖DG1。For example, please refer to Figures 1 to 3. The server 110 of the management system 100 generates the first authority structure directed graph DG1 according to a plurality of job roles (for example: job role A to job role G).

在一些實施例中,複數個職位角色包含第一職位角色(例如:職位角色B)及第二職位角色(例如:職位角色I)。第一職位角色(例如:職位角色B)包含複數個第一權限。第二職位角色(例如:職位角色I)包含複數個第二權限。In some embodiments, the plurality of job roles includes a first job role (eg, job role B) and a second job role (eg, job role I). The first job role (for example: job role B) contains multiple first permissions. The second job role (for example: job role I) contains multiple second permissions.

接著,若第一職位角色(例如:職位角色B)之複數個第一權限之第一數量與第二職位角色(例如:職位角色I)之複數個第二權限之第二數量相同,藉由管理系統100之伺服器110判斷複數個第一權限之每一者之種類及複數個第二權限之每一者之種類是否均相同。Then, if the first number of the plurality of first permissions of the first job role (for example: job role B) is the same as the second number of the plurality of second permissions of the second job role (for example: job role I), by The server 110 of the management system 100 determines whether the types of each of the plurality of first permissions and the types of each of the plurality of second permissions are the same.

再者,若複數個第一權限之每一者之種類及複數個第二權限之每一者之種類均相同,則藉由管理系統100之伺服器110選取第一職位角色及第二職位角色之其中至少一者(例如:選取職位角色B),並根據第一職位角色及第二職位角色之其中至少一者而產生第一權限結構有向圖DG1。Furthermore, if the types of each of the plurality of first authorities and the types of each of the plurality of second authorities are the same, the first job role and the second job role are selected by the server 110 of the management system 100 At least one of them (for example: select job role B), and generate the first authority structure directed graph DG1 based on at least one of the first job role and the second job role.

舉例而言,請參閱第3圖,職位角色B擁有4種權限,而職位角色I亦擁有4種權限。此時,則藉由管理系統100之伺服器110判斷職位角色B之4種權限及職位角色I之4種權限是否均相同。若職位角色B之4種權限及職位角色I之4種權限被判定為均相同,則選取職位角色B以作為代表,藉以產生第一權限結構有向圖DG1。For example, please refer to Figure 3. Job role B has 4 permissions, and job role I also has 4 permissions. At this time, the server 110 of the management system 100 determines whether the four permissions of job role B and the four permissions of job role I are the same. If the four permissions of job role B and the four permissions of job role I are determined to be the same, then job role B is selected as the representative to generate the first permission structure directed graph DG1.

須說明的是,此判斷職位角色之權限是否相同之步驟之目的在於簡化擁有相同權限之職位角色,以使第一權限結構有向圖DG1為簡潔之圖式。進一步說明,當組職擴張而細分許多附屬單位或組職之職位角色日益漸增時,此判斷職位角色之權限是否相同之步驟有助於權限管理資料之簡化。It should be noted that the purpose of this step of determining whether the permissions of job roles are the same is to simplify job roles with the same permissions, so that the first permission structure directed graph DG1 is a simple schema. It is further explained that when organizational positions expand and are subdivided into many subsidiary units or the number of job roles increases, this step of determining whether the permissions of job roles are the same helps to simplify permission management data.

在一些實施例中,請參閱第1圖至第3圖,若第一職位角色(例如:職位角色C)之複數個第一權限之第一數量與第二職位角色(例如:職位角色B)之複數個第二權限之第二數量相同,藉由管理系統100之伺服器110判斷複數個第一權限之每一者之第一種類及複數個第二權限之每一者之第二種類是否均相同。In some embodiments, please refer to Figures 1 to 3, if the first number of the plurality of first permissions of the first job role (for example: job role C) and the second job role (for example: job role B) The second numbers of the plurality of second permissions are the same, and the server 110 of the management system 100 determines whether the first type of each of the plurality of first permissions and the second type of each of the plurality of second permissions are All are the same.

接著,若複數個第一權限之每一者之第一種類及複數個第二權限之每一者之第二種類不相同,則藉由管理系統100之伺服器110判定第一職位角色(例如:職位角色C)及第二職位角色(例如:職位角色B)不相同,藉以根據第一職位角色(例如:職位角色C)及第二職位角色(例如:職位角色B)而產生第一權限結構有向圖DG1。Then, if the first type of each of the plurality of first permissions and the second type of each of the plurality of second permissions are different, the server 110 of the management system 100 determines the first job role (for example, : Job role C) and the second job role (eg: Job role B) are different, so that the first authority is generated based on the first job role (eg: Job role C) and the second job role (eg: Job role B) Structural directed graph DG1.

舉例而言,請參閱第3圖,職位角色B擁有4種權限,而職位角色C亦擁有4種權限。此時,則藉由管理系統100之伺服器110判斷職位角色B之4種權限及職位角色C之4種權限是否均相同。若職位角色B之4種權限的其中至少一者及職位角色C之4種權限的其中至少一者被判定為不相同,則藉由管理系統100之伺服器110根據職位角色B及職位角色C而產生如第3圖所示第一權限結構有向圖DG1。 For example, please refer to Figure 3. Job role B has 4 permissions, and job role C also has 4 permissions. At this time, the server 110 of the management system 100 determines whether the four permissions of job role B and the four permissions of job role C are the same. If at least one of the four permissions of job role B and at least one of the four permissions of job role C are determined to be different, the server 110 of the management system 100 will use the server 110 of the management system 100 to obtain the permissions based on the job role B and the job role C. The first authority structure directed graph DG1 is generated as shown in Figure 3.

在一些實施例中,請參閱第1圖至第3圖,複數個職位角色更包含第三職位角色(例如:職位角色A)。第三職位角色(例如:職位角色A)包含複數個第三權限。若複數個第三權限之第三數量小於複數個第一權限之第一數量且複數個第一權限包含第三權限,藉由管理系統100之伺服器110以第三職位角色(例如:職位角色A)為準而產生權限向量v1,藉以使權限向量v1自第三職位角色(例如:職位角色A)連結至第一職位角色(例如:職位角色C)。權限向量v2至權限向量v6之產生方式與權限向量v1之產生方式相同,與此不作贅述。 In some embodiments, please refer to Figures 1 to 3, the plurality of job roles further include a third job role (for example: job role A). The third job role (for example: job role A) contains multiple third permissions. If the third number of the plurality of third permissions is less than the first number of the plurality of first permissions and the plurality of first permissions include the third permission, the server 110 of the management system 100 uses a third job role (for example: job role) The permission vector v1 is generated based on A), so that the permission vector v1 is connected from the third job role (for example: job role A) to the first job role (for example: job role C). The generation method of permission vector v2 to permission vector v6 is the same as the generation method of permission vector v1, which will not be described again.

須說明的是,複數個第一權限包含第三權限的意思為第一職位角色之複數個第一權限涵蓋第三職位角色所擁有的複數個第三權限。舉例而言,職位角色C擁有4種權限,其分別為第一產線報表、第二產線報表、第一產品實驗報表及第二產品實驗報表。職位角色A擁有3種權限,其分別為第一產線報表、第一產品實驗報表及第二產品實 驗報表。 It should be noted that the plurality of first permissions including third permissions means that the plurality of first permissions of the first position and role cover the plurality of third permissions owned by the third position and role. For example, job role C has 4 types of permissions, which are the first production line report, the second production line report, the first product experiment report and the second product experiment report. Job role A has 3 types of permissions, which are the first production line report, the first product experiment report and the second product actual report. Verification report.

進一步說明的是,邊為有方向的圖稱作有向圖(directed graph或digraph)。而本案之權限結構有向圖必由權限較少之職位角色指向權限較多之職位角色。 To further explain, a graph with directional edges is called a directed graph (directed graph or digraph). The directed graph of the permission structure in this case must point from job roles with less permissions to job roles with more permissions.

在一些實施例中,請參閱第1圖至第3圖,藉由管理系統100之伺服器110根據複數個第一權限之第一數量及複數個第三權限之第三數量以計算權限向量之權重值。計算權限向量之權重值之公式列如下:

Figure 111142673-A0305-02-0010-1
In some embodiments, please refer to Figures 1 to 3, the server 110 of the management system 100 calculates the authorization vector according to the first number of the plurality of first authorizations and the third number of the plurality of third authorizations. weight value. The formula for calculating the weight value of the permission vector is as follows:
Figure 111142673-A0305-02-0010-1

於式1中,W為權限向量之權重值。M1為權限較多之職位角色之權限數量。M2為權限較少之職位角色之權限數量。α為預設數值,α大於等於1。 In Formula 1, W is the weight value of the authority vector. M1 is the number of permissions for a position with more permissions. M2 is the number of permissions for job roles with fewer permissions. α is a preset value, α is greater than or equal to 1.

舉例而言,請參閱第3圖,假設式1之α=2,職位角色C擁有4種權限且職位角色A擁有3種權限。根據上述式1計算權限向量v1之權重值w1,則權重值w1應 為

Figure 111142673-A0305-02-0010-2
,權重值w1之簡化數值為
Figure 111142673-A0305-02-0010-3
。 For example, please refer to Figure 3. Assume that α=2 in Formula 1, job role C has 4 kinds of permissions and job role A has 3 kinds of permissions. Calculate the weight value w1 of the permission vector v1 according to the above formula 1, then the weight value w1 should be
Figure 111142673-A0305-02-0010-2
, the simplified value of the weight value w1 is
Figure 111142673-A0305-02-0010-3
.

在一些實施例中,本案計算權限向量之權重值之公式不限於上述式1。須說明的是,能計算出權限向量之權重值之任意公式皆可。權限向量v2至權限向量v6之權重值之計算方式與權限向量v1之權重值之計算方式相同,與此不作贅述。 In some embodiments, the formula for calculating the weight value of the permission vector in this case is not limited to the above formula 1. It should be noted that any formula that can calculate the weight value of the permission vector can be used. The calculation method of the weight value of the permission vector v2 to the permission vector v6 is the same as the calculation method of the weight value of the permission vector v1, and will not be described again.

在一些實施例中,請參閱第3圖,本案權限管理方法200可根據權限以計算出職位角色A、職位角色B及職位角色D之權限向量v2及權限向量v3。須說明的是,本案權限管理方法200亦可根據權限以計算出職位角色A至職位角色D之權限向量(圖中未示)。In some embodiments, please refer to Figure 3. The permission management method 200 of this case can calculate the permission vector v2 and the permission vector v3 of job role A, job role B and job role D based on the permissions. It should be noted that the authority management method 200 in this case can also calculate the authority vectors from job role A to job role D based on the authority (not shown in the figure).

此時採用權重值修改職位角色A至職位角色D之權限向量(圖中未示)之權重值,藉以使職位角色A至職位角色D之權限向量(圖中未示) 之權重值大於權限向量v2之權重值加上權限向量v3之權重值,藉以隱藏職位角色A至職位角色D之權限向量(圖中未示),以顯示權限向量v2及權限向量v3。最後,本案權限管理方法200將呈現如第3圖所示第一權限結構有向圖DG1。At this time, the weight value is used to modify the weight value of the authority vector (not shown in the figure) of job role A to job role D, so that the weight value of the authority vector (not shown in the figure) of job role A to job role D is greater than the authority vector. The weight value of v2 is added to the weight value of permission vector v3 to hide the permission vectors of job role A to job role D (not shown in the figure) to display permission vector v2 and permission vector v3. Finally, the permission management method 200 in this case will present the first permission structure directed graph DG1 as shown in Figure 3.

於步驟230中,選取第一權限結構有向圖中之複數個職位角色的其中至少一者,以作為目標職位角色。In step 230, at least one of the plurality of job roles in the first authority structure directed graph is selected as the target job role.

舉例而言,請參閱第1圖、第2圖及第4圖,藉由管理系統100之伺服器110選取第一權限結構有向圖DG1中之複數個職位角色的其中至少一者(例如:選取職位角色D或選取職位角色F),以作為目標職位角色。須說明的是,職位角色D可為一個組職之一個部門之主管。職位角色F為與職位角色D不同部門之主管。For example, please refer to Figures 1, 2 and 4. The server 110 of the management system 100 selects at least one of a plurality of job roles in the first authority structure directed graph DG1 (for example: Select Job Role D or Select Job Role F) as the target job role. It should be noted that the job role D can be the director of a department within a group. Job role F is the director of a different department from job role D.

於步驟240中,根據目標職位角色產生最小有向生成圖於第一權限結構有向圖中。In step 240, a minimum directed generation graph is generated in the first authority structure directed graph according to the target position role.

承上述步驟230,請參閱第1圖、第2圖、第4圖以及第5圖,藉由管理系統100之伺服器110選取目標職位角色(例如:選取職位角色D),接著,藉由管理系統100之伺服器110根據目標職位角色(例如:選取職位角色D)產生最小有向生成圖MDG於第一權限結構有向圖DG1中。Following the above step 230, please refer to Figure 1, Figure 2, Figure 4 and Figure 5, select the target job role (for example: select job role D) through the server 110 of the management system 100, and then, through the management The server 110 of the system 100 generates the minimum directed generation graph MDG in the first authority structure directed graph DG1 according to the target job role (for example, selecting job role D).

在一些實施例中,複數個職位角色包含複數個第一群組角色(例如:職位角色A、職位角色B、職位角色C、職位角色D及職位角色H)及複數個第二群組角色(例如:職位角色E、職位角色F及職位角色G)。In some embodiments, the plurality of job roles include a plurality of first group roles (for example: job role A, job role B, job role C, job role D, and job role H) and a plurality of second group roles (eg, job role A, job role B, job role C, job role D, and job role H). For example: job role E, job role F and job role G).

在一些實施例中,藉由管理系統100之伺服器110選取複數個第一群組角色之其中至少一者(例如:選取職位角色D)以作為目標職位角色。藉由管理系統100之伺服器110根據複數個第一群組角色(例如:職位角色A、職位角色B、職位角色C、職位角色D及職位角色H)及目標職位角色(例如:職位角色D)以產生如第5圖所示之最小有向生成圖MDG。In some embodiments, the server 110 of the management system 100 selects at least one of a plurality of first group roles (for example, selects job role D) as the target job role. Through the server 110 of the management system 100, the server 110 determines the position according to the plurality of first group roles (for example: job role A, job role B, job role C, job role D and job role H) and the target job role (e.g.: job role D). ) to generate the minimum directed generation graph MDG as shown in Figure 5.

此外,藉由管理系統100之伺服器110選取複數個第二群組角色(例如:職位角色E、職位角色F及職位角色G)以作為複數個孤立角色IR。In addition, the server 110 of the management system 100 selects a plurality of second group roles (eg, job role E, job role F, and job role G) as a plurality of isolated roles IR.

須說明的是,假定職位角色H為公司之董事長或總經理,圖式中之職位角色G之意義為職位角色G擁有公司之董事長或總經理都沒有的特殊權限。It should be noted that assuming that the position role H is the chairman or general manager of the company, the meaning of the position role G in the diagram is that the position role G has special authority that the chairman or general manager of the company does not have.

承上述步驟230,請參閱第1圖、第2圖、第4圖以及第6圖,藉由管理系統100之伺服器110選取目標職位角色(例如:選取職位角色F),接著,藉由管理系統100之伺服器110根據目標職位角色(例如:選取職位角色F)產生最小有向生成圖MDG於第一權限結構有向圖DG1中。Following the above step 230, please refer to Figure 1, Figure 2, Figure 4 and Figure 6, select the target job role (for example: select job role F) through the server 110 of the management system 100, and then, through the management The server 110 of the system 100 generates the minimum directed generation graph MDG in the first authority structure directed graph DG1 according to the target job role (for example: selecting job role F).

在一些實施例中,複數個職位角色包含複數個第一群組角色(例如:職位角色E及職位角色F)及複數個第二群組角色(例如:職位角色A、職位角色B、職位角色C、職位角色D、職位角色H及職位角色G)。In some embodiments, the plurality of job roles include a plurality of first group roles (eg, job role E and job role F) and a plurality of second group roles (eg, job role A, job role B, job role C. Job role D, job role H and job role G).

在一些實施例中,藉由管理系統100之伺服器110選取複數個第一群組角色之其中至少一者(例如:選取職位角色F)以作為目標職位角色。藉由管理系統100之伺服器110根據複數個第一群組角色(例如:職位角色E及職位角色F)及目標職位角色(例如:職位角色F)以產生如第6圖所示之最小有向生成圖MDG。In some embodiments, the server 110 of the management system 100 selects at least one of a plurality of first group roles (for example, selects job role F) as the target job role. The server 110 of the management system 100 generates the minimum valid information as shown in Figure 6 based on the plurality of first group roles (for example: job role E and job role F) and the target job role (for example: job role F). To generate graph MDG.

此外,藉由管理系統100之伺服器110選取複數個第二群組角色(例如: 職位角色A、職位角色B、職位角色C、職位角色D、職位角色H及職位角色G)以作為複數個孤立角色IR。In addition, the server 110 of the management system 100 selects a plurality of second group roles (for example: job role A, job role B, job role C, job role D, job role H and job role G) as a plurality of Isolated role IR.

於步驟250中,判斷第一權限結構有向圖中之複數個職位角色中的每一者之權限及職位是否相符。In step 250, it is determined whether the authority and position of each of the plurality of job roles in the first authority structure directed graph match.

舉例而言,承上述步驟240,請參閱第1圖、第2圖及第5圖,藉由管理系統100之伺服器110判斷作為複數個孤立角色IR之複數個第二群組角色(例如:職位角色E、職位角色F及職位角色G)之權限及職位是否相符。若作為複數個孤立角色IR之複數個第二群組角色之權限及職位被判定為不相符,則藉由管理系統100之伺服器110執行步驟260。For example, following the above step 240, please refer to Figure 1, Figure 2 and Figure 5, the server 110 of the management system 100 determines a plurality of second group roles as a plurality of isolated role IRs (for example: Whether the permissions and positions of job role E, job role F and job role G) match. If the permissions and positions of the plurality of second group roles as the plurality of isolated role IRs are determined to be inconsistent, step 260 is executed by the server 110 of the management system 100 .

接著,若作為複數個孤立角色IR之複數個第二群組角色之權限及職位被判定為相符,則藉由管理系統100之伺服器110判斷第一權限結構有向圖DG1之最小有向生成圖MDG中之複數個職位角色中的每一者(例如:職位角色A、職位角色B、職位角色C、職位角色D及職位角色H)之權限及職位是否相符。若第一權限結構有向圖DG1之最小有向生成圖MDG中之複數個職位角色中的每一者不相符,則藉由管理系統100之伺服器110執行步驟260。Then, if the permissions and positions of the plurality of second group roles as the plurality of isolated roles IR are determined to be consistent, the server 110 of the management system 100 determines the minimum directed generation of the first permission structure directed graph DG1 Whether the permissions and positions of each of the plurality of job roles in Figure MDG (for example: job role A, job role B, job role C, job role D, and job role H) match. If each of the plurality of job roles in the minimum directed generated graph MDG of the first authority structure directed graph DG1 does not match, step 260 is executed by the server 110 of the management system 100 .

此外,若第一權限結構有向圖DG1之最小有向生成圖MDG中之複數個職位角色中的每一者相符,則藉由管理系統100之伺服器110執行步驟270。In addition, if each of the plurality of job roles in the minimum directed generated graph MDG of the first authority structure directed graph DG1 matches, step 270 is executed by the server 110 of the management system 100 .

須說明的是,第6圖之實施例之判斷方式與第5圖之實施例之判斷方式相同,於此不作贅述。It should be noted that the judgment method of the embodiment in Figure 6 is the same as the judgment method of the embodiment in Figure 5 and will not be described again here.

於步驟260中,調整複數個職位角色之權限及職位。In step 260, the permissions and positions of multiple job roles are adjusted.

舉例而言,承上述步驟250,請參閱第1圖、第2圖、第5圖及第7圖,若作為複數個孤立角色IR之複數個第二群組角色(例如:職位角色E、職位角色F及職位角色G)之權限及職位被判定為相符且判定第一權限結構有向圖DG1之最小有向生成圖MDG中之複數個職位角色中的每一者(例如:職位角色A、職位角色B、職位角色C、職位角色D及職位角色H)為不相符,則藉由管理系統100之伺服器110調整複數個職位角色(例如:職位角色A’及職位角色D’)之權限及職位,藉以重新執行步驟220,以產生如第7圖所示之第二權限結構有向圖DG2。 For example, following the above step 250, please refer to Figure 1, Figure 2, Figure 5 and Figure 7, if a plurality of second group roles (for example: position role E, position The permissions and positions of role F and position role G) are determined to be consistent and each of the plurality of job roles in the minimum directed generated graph MDG of the first permission structure directed graph DG1 (for example: position role A, If job role B, job role C, job role D and job role H) do not match, then the server 110 of the management system 100 adjusts the permissions of multiple job roles (for example: job role A' and job role D'). and positions, thereby re-executing step 220 to generate the second authority structure directed graph DG2 as shown in Figure 7.

接著,舉例而言,請參閱第1圖、第2圖、第5圖及第7圖,管理系統100之伺服器110判定職位角色A為部門主管,其具有3種權限。管理系統100之伺服器110判定職位角色D為部門組員,其具有5種權限。藉由管理系統100之伺服器110判定職位角色A及職位角色D之職位及權限被判定不相符,並藉由管理系統100之伺服器110調整第5圖之職位角色A及職位角色D為第7圖之職位角色A’及職位角色D’。 Next, for example, please refer to Figures 1, 2, 5 and 7. The server 110 of the management system 100 determines that the job role A is a department manager, which has three types of permissions. The server 110 of the management system 100 determines that the job role D is a department member and has 5 types of permissions. The server 110 of the management system 100 determines that the positions and permissions of job role A and job role D are not consistent, and the server 110 of the management system 100 adjusts job role A and job role D in Figure 5 to be the first. Figure 7 shows job role A' and job role D'.

須說明的是,上述步驟220至步驟260皆可重複執行。 It should be noted that the above steps 220 to 260 can be executed repeatedly.

於步驟270中,根據調整後的複數個職位角色以產生目標權限結構有向圖。 In step 270, a target authority structure directed graph is generated based on the adjusted plurality of job roles.

舉例而言,承上述步驟260,請參閱第1圖、第2圖、第7圖及第8圖,第7圖之第二權限結構有向圖DG2將被管理系統100之伺服器110重複執行步驟220至步驟260。第7圖之第二權限結構有向圖DG2之複數職位角色之每一者之權限及職位被判定為均相符,則藉由管理系統100之伺服器110根據調整後的複數個職位角色以產生如第8圖所示之目標權限結構有向圖TDG。 For example, following the above step 260, please refer to Figure 1, Figure 2, Figure 7 and Figure 8. The second permission structure directed graph DG2 in Figure 7 will be repeatedly executed by the server 110 of the managed system 100. Step 220 to step 260. If the permissions and positions of each of the plurality of job roles in the second authority structure directed graph DG2 in Figure 7 are determined to be consistent, then the server 110 of the management system 100 will generate a plurality of job roles based on the adjustment. The target authority structure directed graph TDG is shown in Figure 8.

在一些實施例中,請參閱第8圖,目標權限結構有向圖TDG中之職位角色H可為公司之董事長及總經理。在一些實施例中,請參閱第8圖,目標權限結構有向圖TDG中之職位角色H可為公司中部門之經理主管。換言之,本 案權限管理方法200可應用於一個組職或一個組職中之一個部門。 In some embodiments, please refer to Figure 8. The position role H in the target authority structure directed graph TDG can be the chairman and general manager of the company. In some embodiments, please refer to Figure 8. The position role H in the target authority structure directed graph TDG can be the manager of the department in the company. In other words, this The case authority management method 200 can be applied to a group position or a department within a group position.

於實作上,權限管理資料不限於第3圖至第8圖之實施例所展示之形式,第3圖至第8圖之實施例僅用以輔助說明。在一些實施例中,權限管理資料之形式可為軟體試算表、圖式或文件。 In practice, the rights management data is not limited to the form shown in the embodiments of Figures 3 to 8, and the embodiments of Figures 3 to 8 are only used to assist explanation. In some embodiments, the rights management data may be in the form of a software spreadsheet, a diagram, or a file.

依據前述實施例,本案提供一種權限管理方法,以產生權限結構有向圖及最小有向生成圖,藉以先將龐大的權限資料進行簡化,並逐一檢查權限結構有向圖及最小有向生成圖中的職位角色之權限及職位,藉以進行細微調整權限及職位不符合之職位角色。另外,本案權限管理方法因應組職擴張而細分許多附屬單位或組職之職位角色日益漸增時,能夠使資訊(Information Technology)部門之管理人員發現權限及職位不符合之職位角色,藉以調整權限及職位不符合之職位角色。 Based on the aforementioned embodiments, this case provides a permission management method to generate a permission structure directed graph and a minimum directed generator graph, thereby first simplifying the huge permission data and checking the permission structure directed graph and minimum directed generator graph one by one. The permissions and positions of the job roles in the function can be used to fine-tune the job roles whose permissions and positions do not match. In addition, the authority management method in this case is subdivided into many subsidiary units or group positions in response to the expansion of organizational positions. When the number of positions and roles increases, the managers of the Information Technology department can find positions and roles that do not match the authority and positions, so as to adjust the authority. and job roles that the position does not meet.

雖然本案以詳細之實施例揭露如上,然而本案並不排除其他可行之實施態樣。因此,本案之保護範圍當視後附之申請專利範圍所界定者為準,而非受於前述實施例之限制。 Although this case is disclosed above with detailed embodiments, this case does not exclude other feasible implementation forms. Therefore, the scope of protection in this case shall be determined by the scope of the appended patent application and shall not be limited by the foregoing embodiments.

對本領域技術人員而言,在不脫離本案之精神和範圍內,當可對本案作各種之更動與潤飾。基於前述實施例,所有對本案所作的更動與潤飾,亦涵蓋於本案之保護範圍內。 For those skilled in the art, various modifications and modifications can be made to the present application without departing from the spirit and scope of the present application. Based on the foregoing embodiments, all changes and modifications made to this case are also covered by the protection scope of this case.

100:管理系統100:Management system

110:伺服器110:Server

120:資料庫120:Database

200:方法200:Method

210~270:步驟210~270: steps

A~I, A’, D’:職位角色A~I, A’, D’: job role

v1~v6:權限向量v1~v6: permission vector

DG1:第一權限結構有向圖DG1: The first authority structure directed graph

DG2:第二權限結構有向圖DG2: Second authority structure directed graph

TDG:目標權限結構有向圖TDG: Target permission structure directed graph

MDG:最小有向生成圖MDG: Minimum directed generator graph

IR:孤立角色IR: isolated role

參照後續段落中的實施方式以及下列圖式,當可更佳地理解本案的內容: 第1圖為根據本案一些實施例繪示的管理系統之電路方塊示意圖; 第2圖為根據本案一些實施例繪示的權限管理方法之步驟流程示意圖; 第3圖為根據本案一些實施例繪示的權限管理方法之權限結構有向圖之示意圖; 第4圖為根據本案一些實施例繪示的權限管理方法之權限結構有向圖示意圖; 第5圖為根據本案一些實施例繪示的權限管理方法之權限結構有向圖示意圖; 第6圖為根據本案一些實施例繪示的權限管理方法之權限結構有向圖示意圖; 第7圖為根據本案一些實施例繪示的權限管理方法之權限結構有向圖示意圖;以及 第8圖為根據本案一些實施例繪示的權限管理方法之權限結構有向圖示意圖。 The contents of this case can be better understood with reference to the implementation methods in the following paragraphs and the following diagrams: Figure 1 is a circuit block diagram of a management system according to some embodiments of this case; Figure 2 is a schematic flow chart of the steps of the rights management method according to some embodiments of this case; Figure 3 is a schematic diagram of a directed graph of the permission structure of the permission management method according to some embodiments of this case; Figure 4 is a schematic diagram of a directed graph of the permissions structure of the permissions management method according to some embodiments of this case; Figure 5 is a schematic diagram of a directed graph of the permission structure of the permission management method according to some embodiments of this case; Figure 6 is a schematic diagram of a directed graph of the permissions structure of the permissions management method according to some embodiments of this case; Figure 7 is a schematic diagram of a directed graph of the permissions structure of the permissions management method according to some embodiments of this case; and Figure 8 is a schematic diagram of a directed graph of the permission structure of the permission management method according to some embodiments of this case.

國內寄存資訊(請依寄存機構、日期、號碼順序註記) 無 國外寄存資訊(請依寄存國家、機構、日期、號碼順序註記) 無 Domestic storage information (please note in order of storage institution, date and number) without Overseas storage information (please note in order of storage country, institution, date, and number) without

200:方法 200:Method

210~270:步驟 210~270: steps

Claims (10)

一種權限管理方法,包含:藉由一管理系統根據一組職權限表產生不同權限之複數個職位角色;藉由該管理系統根據該些職位角色以產生一第一權限結構有向圖;藉由該管理系統選取該第一權限結構有向圖中之該些職位角色的其中至少一者,以作為一目標職位角色;藉由該管理系統根據該目標職位角色產生一最小有向生成圖於該第一權限結構有向圖中;藉由該管理系統判斷該第一權限結構有向圖中之該些職位角色中的每一者之一權限之一數量及一種類與一職位是否相符;以及若該第一權限結構有向圖中之該些職位角色中的每一者之該權限之該數量及該種類與該職位被判定為不相符,則藉由該管理系統調整該些職位角色中的每一者之該權限及該職位,藉以產生一第二權限結構有向圖。 A permission management method, including: using a management system to generate a plurality of job roles with different permissions based on a set of job permission tables; using the management system to generate a first permission structure directed graph based on the job roles; using The management system selects at least one of the job roles in the first authority structure directed graph as a target job role; the management system generates a minimum directed generated graph based on the target job role in the in the first authority structure directed graph; using the management system to determine whether the number and type of authority of each of the job roles in the first authority structure directed graph are consistent with a position; and If the number and type of permissions of each of the job roles in the first permission structure directed graph are determined to be inconsistent with the position, the management system will adjust the number of permissions in the job roles through the management system. The authority and the position of each, thereby generating a second authority structure directed graph. 如請求項1所述之權限管理方法,其中該些職位角色包含一第一職位角色及一第二職位角色,其中該第一職位角色包含複數個第一權限,其中該第二職位角色包含複數個第二權限,其中藉由該管理系統根據該些職位角色以產生該第一權限結構有向圖之步驟包含:若該些第一權限之一第一數量及該些第二權限之一第 二數量相同,藉由該管理系統判斷該些第一權限之每一者之一第一種類及該些第二權限之每一者之一第二種類是否均相同;以及若該些第一權限之每一者之該第一種類及該些第二權限之每一者之該第二種類均相同,則藉由該管理系統選取該第一職位角色及該第二職位角色之其中至少一者,並根據該第一職位角色及該第二職位角色之其中至少一者而產生該第一權限結構有向圖。 The permission management method as described in claim 1, wherein the job roles include a first job role and a second job role, wherein the first job role includes a plurality of first permissions, and the second job role includes a plurality of first permissions. a second authority, wherein the step of generating the first authority structure directed graph according to the job roles by the management system includes: if the first number of one of the first authority and the first number of one of the second authority If the two quantities are the same, the management system determines whether the first type of each of the first permissions and the second type of each of the second permissions are the same; and if the first permissions The first type of each of the second permissions and the second type of each of the second permissions are the same, then at least one of the first job role and the second job role is selected through the management system , and generate the first authority structure directed graph based on at least one of the first job role and the second job role. 如請求項2所述之權限管理方法,其中藉由該管理系統根據該些職位角色以產生該第一權限結構有向圖之步驟更包含:若該些第一權限之每一者之該第一種類及該些第二權限之每一者之該第二種類不相同,則藉由該管理系統判定該第一職位角色及該第二職位角色不相同,藉以根據該第一職位角色及該第二職位角色而產生該第一權限結構有向圖。 The authority management method as described in claim 2, wherein the step of generating the first authority structure directed graph according to the job roles by the management system further includes: if the third authority of each of the first authority If a type and the second type of each of the second permissions are different, then the management system determines that the first job role and the second job role are not the same, so as to determine based on the first job role and the second job role. The second position role generates the first authority structure directed graph. 如請求項2所述之權限管理方法,其中該些職位角色更包含一第三職位角色,其中該第三職位角色包含複數個第三權限,其中藉由該管理系統根據該些職位角色以產生該第一權限結構有向圖之步驟更包含:若該些第三權限之一第三數量小於該些第一權限之該第一數量且該些第一權限包含該些第三權限,藉由該管理 系統以該第三職位角色為準而產生一權限向量,藉以使該權限向量自該第三職位角色連結至該第一職位角色。 The permission management method as described in claim 2, wherein the job roles further include a third job role, wherein the third job role includes a plurality of third permissions, and the management system generates The steps of the first permission structure directed graph further include: if a third quantity of one of the third permissions is less than the first quantity of the first permissions and the first permissions include the third permissions, by The management The system generates a permission vector based on the third job role, so that the permission vector is linked from the third job role to the first job role. 如請求項4所述之權限管理方法,其中藉由該管理系統根據該些職位角色以產生該第一權限結構有向圖之步驟更包含:藉由該管理系統根據該些第一權限之該第一數量及該些第三權限之該第三數量以計算該權限向量之一權重值。 The permission management method as described in claim 4, wherein the step of generating the first permission structure directed graph according to the job roles by the management system further includes: using the management system according to the first permissions The first number and the third number of the third permissions are used to calculate a weight value of the permission vector. 如請求項5所述之權限管理方法,其中該些職位角色包含複數個第一群組角色及複數個第二群組角色,其中藉由該管理系統選取該第一權限結構有向圖中之該些職位角色的其中至少一者,以作為該目標職位角色之步驟包含:藉由該管理系統選取該些第一群組角色之其中至少一者以作為該目標職位角色;以及藉由該管理系統選取該些第二群組角色以作為複數個孤立角色。 The permission management method as described in claim 5, wherein the job roles include a plurality of first group roles and a plurality of second group roles, wherein the management system selects one of the first permission structure directed graphs The step of using at least one of the job roles as the target job role includes: selecting at least one of the first group roles as the target job role through the management system; and through the management The system selects these second group characters as a plurality of isolated characters. 如請求項6所述之權限管理方法,其中該些第一群組角色包含以該權限向量連結的該第一職位角色及該第三職位角色。 The permission management method of claim 6, wherein the first group roles include the first job role and the third job role linked by the permission vector. 如請求項6所述之權限管理方法,其中藉由 該管理系統根據該目標職位角色產生該最小有向生成圖於該第一權限結構有向圖中之步驟包含:藉由該管理系統根據該目標職位角色及該些第一群組角色以產生該最小有向生成圖。 The rights management method as described in claim 6, wherein by The steps for the management system to generate the minimum directed generation graph in the first authority structure directed graph based on the target job role include: generating the management system based on the target job role and the first group roles. Minimal directed generating graph. 如請求項8所述之權限管理方法,其中藉由該管理系統判斷該第一權限結構有向圖中之該些職位角色中的每一者之該權限之該數量及該種類與該職位是否相符之步驟包含:藉由該管理系統判斷作為該些孤立角色之該些第二群組角色之該權限及該職位是否相符;以及若作為該些孤立角色之該些第二群組角色之該權限及該職位被判定為不相符,則藉由該管理系統調整作為該些孤立角色之該些第二群組角色之該權限及該職位,藉以產生該第二權限結構有向圖。 The permission management method as described in claim 8, wherein the management system determines whether the number and type of permissions for each of the job roles in the first permission structure directed graph are consistent with the position. The matching steps include: using the management system to determine whether the permissions and positions of the second group roles as the isolated roles are consistent; and if the second group roles as the isolated roles are If the authority and the position are determined to be inconsistent, the management system adjusts the authority and the position of the second group roles as the isolated roles, thereby generating the second authority structure directed graph. 如請求項1所述之權限管理方法,更包含:若該第二權限結構有向圖中之該些職位角色之每一者之該權限之該數量及該種類與該職位被判定為均相符,則藉由該管理系統根據調整後的該些職位角色以產生一目標權限結構有向圖。 The permission management method as described in claim 1 further includes: if the number and type of permissions for each of the job roles in the second permission structure directed graph are determined to be consistent with the position. , then the management system generates a target authority structure directed graph according to the adjusted job roles.
TW111142673A 2022-11-08 2022-11-08 Method for permission management TWI818798B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW111142673A TWI818798B (en) 2022-11-08 2022-11-08 Method for permission management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW111142673A TWI818798B (en) 2022-11-08 2022-11-08 Method for permission management

Publications (2)

Publication Number Publication Date
TWI818798B true TWI818798B (en) 2023-10-11
TW202420183A TW202420183A (en) 2024-05-16

Family

ID=89857628

Family Applications (1)

Application Number Title Priority Date Filing Date
TW111142673A TWI818798B (en) 2022-11-08 2022-11-08 Method for permission management

Country Status (1)

Country Link
TW (1) TWI818798B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200709084A (en) * 2005-08-26 2007-03-01 Sagatek Co Ltd Setting up and execution system for enterprise activity management systems
AU2010212301B2 (en) * 2003-06-05 2012-03-15 Intertrust Technologies Corporation Digital Rights Management Engine Systems and Methods
CN114092065A (en) * 2021-11-29 2022-02-25 贵州桥梁建设集团有限责任公司 Data governance platform organizational structure and system management
CN115098591A (en) * 2022-06-24 2022-09-23 管杰 Method and system for workflow based on block chain decentralization

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2010212301B2 (en) * 2003-06-05 2012-03-15 Intertrust Technologies Corporation Digital Rights Management Engine Systems and Methods
TW200709084A (en) * 2005-08-26 2007-03-01 Sagatek Co Ltd Setting up and execution system for enterprise activity management systems
CN114092065A (en) * 2021-11-29 2022-02-25 贵州桥梁建设集团有限责任公司 Data governance platform organizational structure and system management
CN115098591A (en) * 2022-06-24 2022-09-23 管杰 Method and system for workflow based on block chain decentralization

Similar Documents

Publication Publication Date Title
Despotis et al. Composition versus decomposition in two-stage network DEA: a reverse approach
Soltani et al. A new approach to client onboarding using self-sovereign identity and distributed ledger
CN108694557B (en) Workflow and method for setting form field operation authority of approval node thereof
Dürr et al. Ratio FK/F π in QCD
CN109032458B (en) Form data authorization method based on role acquisition
Zhang et al. Some similarity measures for triangular fuzzy number and their applications in multiple criteria group decision‐making
EP3654133A1 (en) Method for setting approval procedure based on base fields
WO2018224024A1 (en) Efficient approval method for workflow approval node
Love et al. ‘Hitting the target and missing the point’: Analysis of air permeability data for new UK dwellings and what it reveals about the testing procedure
KR20200029029A (en) How to set authority in the user's information exchange unit in the system
KR20200035122A (en) How to grant permission to display the current status of the status of all system users
CN105912924A (en) Method for sending permissions to users' accounts in enterprise information management system
Velychko et al. Metrological traceability at different measurement levels
US11750616B2 (en) Method for authorizing approval processes and approval nodes thereof for user
US20080178255A1 (en) Method for document oriented adaptive security management
TWI818798B (en) Method for permission management
KR20200017514A (en) How to Authorize Field Values in Form Fields Through Third-Party Fields
CN110569041A (en) cloud platform security evaluation method during deployment and migration of cross-cloud application
Li et al. Fabric-scf: A blockchain-based secure storage and access control scheme for supply chain finance
Altemimi et al. IT Governance Landscape: Toward Understanding the Effective IT Governance Decision-Making.
TW202420183A (en) Method for permission management
Indriyanti et al. Development of mapping area software for dismissal people affected by covid-19
Sepehrian et al. An approach for generating weights using the pairwise comparison matrix
CN110427770A (en) A kind of Access and control strategy of database method and system for supporting service security to mark
US11430061B2 (en) Dynamic multi-party message reporting system