参考文献/References:
[1] 罗时飞. 敏捷Acegi、CAS:构建安全的Java系统 [M]. 北京:电子工业出版社, 2007.
[2] PORTER M E. Secure your Java application:Acegi security style [EB/OL]. http:∥www.javalobby.org/articles/acegisecurity/part1.jsp, 2004.
[3] RICHARDSON C. Untangling enterprise Java [J]. ACM Queue Component Technologies in Component Technologies, 2006(5):36-44.
[4] 计磊, 李里, 周伟. 精通J2EE:Eclipse、Struts、Hibernate及Spring整合应用案例 [M]. 北京:人民邮电出版社, 2006.
[5] VASHISHTHA S. Acegi security in one hour [EB/OL]. http:∥www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html, 2007.
相似文献/References:
[1]吴金龙.MIS从单机到网络环境的转换及其实现[J].华侨大学学报(自然科学版),1992,13(2):285.[doi:10.11830/ISSN.1000-5013.1992.02.0285]
Wu Jinlong.Transformation of Management Information System from the Environment of Single PC to Network and Its Implementation[J].Journal of Huaqiao University(Natural Science),1992,13(1):285.[doi:10.11830/ISSN.1000-5013.1992.02.0285]
[2]陈永红.一种软件的工业化生产方式[J].华侨大学学报(自然科学版),2008,29(2):229.[doi:10.11830/ISSN.1000-5013.2008.02.0229]
CHEN Yong-hong.A Method the Industrializing Software Production[J].Journal of Huaqiao University(Natural Science),2008,29(1):229.[doi:10.11830/ISSN.1000-5013.2008.02.0229]