z-logo
Premium
COMMON MODELS FOR CONFIGURATION MANAGEMENT AND AUTHORIZATION MANAGEMENT IN SYSTEMS ENGINEERING ENVIRONMENTS
Author(s) -
Kalathil Biju,
Welsh John,
Tuck Mary Catherine,
Bailey Mark,
Zielhke Auti
Publication year - 1996
Publication title -
incose international symposium
Language(s) - English
Resource type - Journals
ISSN - 2334-5837
DOI - 10.1002/j.2334-5837.1996.tb02028.x
Subject(s) - configuration management (itsm) , vendor , computer science , authorization , usability , software configuration management , software engineering , process (computing) , systems engineering , process management , software , engineering , software development , operating system , computer security , software construction , business , marketing
In an integrated product development environment that includes several vendor tools, diverse and incompatible configuration management mechanisms and authorization management mechanisms across tools can lead to inefficiencies in the design process. We describe in this document a common model of configuration management and authorization that may be adopted for an integrated product development environment. We specified a common minimal set of configuration management mechanisms and authoriza‐tion management mechanisms that must be provided by the tools to support the proposed configuration and authorization models. We implemented a pilot program of the configuration management and authorization management models using Intergraph Corporation's Document Manager 2.0 (DM2) software system. This pilot implementation proves the plausability and usability of the model.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here