Information Technology Reference
In-Depth Information
InstanceOf
EventOccurrence
EventType
WorkFlow
AppliedTo
Allows
ObjectType
AuthProtocol
ExecutionEvaluation
AuthProtocol
ExecutionReport
AuthProtocol
Execution
AuthProtcol
AuthProtocolHistory
DocumentedBy
ExecutionOf
DocumentedBy
ReferenceStep
Identity
Evaluation
Integrity
Evaluation
ProvenanceStep
W orkFlow
DocumentedBy
ExecutionOf
FixityStep
Experience
AuthStep
ExecutionReport
AuthStep
Execution
AuthStep
ContextStep
BestPractice
AccessRightsStep
Guideline
PerformedBy
BasedUpon
ExecutedBy
AuthRecommendations
Policy
Manual Actor
Standard
InstanceOf
ActorOccurrence
ActorType
Law
Automatic Actor
...........
PerformedBy
BasedUpon
Fig. 13.6 Authenticity Model
Search WWH ::




Custom Search