|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20325 occurrences of 7772 keywords
|
|
|
Results
Found 44187 publication records. Showing 44182 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Gregor Hohpe |
06291 Workshop Report: Conversation Patterns. |
The Role of Business Processes in Service Oriented Architectures |
2006 |
DBLP BibTeX RDF |
|
28 | Jonathon Tidswell, Trent Jaeger |
Integrated constraints and inheritance in DTAC. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Glenn Faden |
RBAC in UNIX Administration. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
UNIX |
28 | D. J. Thomsen, Richard C. O'Brien, Charles N. Payne |
Napoleon: Network Application Policy Environment. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Joon S. Park, Ravi S. Sandhu |
RBAC on the Web by Smart Certificates. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
|
28 | David F. Ferraiolo |
Products and Tools (Panel Session). |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP BibTeX RDF |
|
28 | Jonathon Tidswell, Geoffrey H. Outhred, John Potter |
Dynamic Rights: Safe Extensible Access Control. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
|
28 | David F. Ferraiolo |
User's Perspectives (Panel Session). |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP BibTeX RDF |
|
28 | Wei-kuang Huang, Vijayalakshmi Atluri |
SecureFlow: A Secure Web-Enabled Workflow Management System. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Trent Jaeger |
On the Increasing Importance of Constraints. |
ACM Workshop on Role-Based Access Control |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Konstantin Beznosov |
Requirements for Access Control: US Healthcare Domain. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Ravi S. Sandhu, Qamar Munawer |
How to Do Discretionary Access Control Using Roles. |
ACM Workshop on Role-Based Access Control |
1998 |
DBLP DOI BibTeX RDF |
|
28 | William J. Meyers |
RBAC emulation on trusted DG/UX. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
|
28 | Tor Didriksen |
Rule based database access control - a practical approach. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
SQL |
28 | Larry S. Bartz |
hyperDRIVE: leveraging LDAP to implement RBAC on the Web. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
Java, Internet |
28 | Ravi S. Sandhu |
Rationale for the RBAC96 family of access control models. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Charles E. Youman |
RBAC transition. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Ravi S. Sandhu |
Issues in RBAC. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Yahya Y. Al-Salqan, V. Juggy Jagannathan, Tad Davis, Nich Zhang, Y. V. Ramana Reddy |
Security and confidentiality in health care informatics. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Ravi S. Sandhu |
Workshop summary. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Edward J. Coyne, Charles E. Youman |
Workshop discussion. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Ravi S. Sandhu |
Roles versus groups. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Edward J. Coyne |
Prioritizing RBAC features. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo 0001 |
Mining roles with semantic meanings. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
28 | He Wang 0020, Sylvia L. Osborn |
Delegation in the role graph model. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
role-based access control, delegation |
28 | Yunyu Song, Sylvia L. Osborn |
Conflict of Interest in the Administrative Role Graph Model. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
access control administration, role-based access control, conflict of interest |
28 | Indira R. Guzman, Michelle L. Kaarst-Brown |
Organizational survival and alignment: insights into conflicting perspectives on the role of the IT professional. |
CPR |
2004 |
DBLP DOI BibTeX RDF |
role of IT professionals, IT professional, strategic alignment, organizational theories |
28 | Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu |
A rule-based framework for role-based delegation and revocation. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
access control, Role, delegation, revocation, rule-based |
28 | Liping Zhao, Elizabeth A. Kendall |
Role Modeling for Component Design. |
TOOLS (33) |
2000 |
DBLP DOI BibTeX RDF |
components, software design, role models |
28 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Raman Adaikkalavan, Sharma Chakravarthy |
Discovery-based role activations in role-based access control. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
28 | HyungHyo Lee, YoungLok Lee, BongNam Noh |
A New Role-Based Delegation Model Using Sub-role Hierarchies. |
ISCIS |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo 0001, Luke Dickens |
Mining roles with noisy data. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
prediction, approximation, noise, role mining, rbac |
27 | Xuhui Ao, Naftaly H. Minsky |
On the role of roles: from role-based to role-sensitive access control. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
access control policy specification and decentralized enforcement, security, role-based access control, law-governed interaction |
27 | Gansen Zhao, Sassa Otenko, David W. Chadwick |
Distributed Key Management for Secure Role based Messaging. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Gunhee Lee, Wonil Kim, Dong-Kyoo Kim, Hongjin Yeh |
Effective Web-Related Resource Security Using Distributed Role Hierarchy. |
WAIM |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Gunhee Lee, Hongjin Yeh, Wonil Kim, Dong-Kyoo Kim |
Web Security Using Distributed Role Hierarchy. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Mark Strembeck |
Scenario-Driven Role Engineering. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
role-based access control, security management, role engineering |
26 | Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert |
A meta model for authorisations in application security systems and their integration into RBAC administration. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
automated identity management, enterprise role-based access control (ERBAC), enterprise roles, sam jupiter, security provisioning, role-based access control (RBAC), application security, security administration |
26 | Ben Medler, Brian Magerko |
The implications of improvisational acting and role-playing on design methodologies. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
performance, design methodologies, role-playing, improvisation, theatre |
26 | Stephen Kimani, Nilufar Baghaei, Jill Freyne, Shlomo Berkovsky, Dipak Bhandari, Gregory Smith 0003 |
Gender and role differences in family-based healthy living networks. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
healthy living, gender, user interaction, role, user requirements, families, online social networks |
26 | Subhendu Aich, Samrat Mondal, Shamik Sural, Arun K. Majumdar |
Role Based Access Control with Spatiotemporal Context for Mobile Applications. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Spatiotemporal domain, Role extent, Permission extent, Spatiotemporal SOD and Telemedicine |
26 | Stella Boess |
First steps in role playing. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
interaction design, role playing, design education, ideation |
26 | Xiaoshuang Xu, Jun Zhang, Egui Zhu, Feng Wang, Ruiquan Liao, Kebin Huang |
Analysis of Role Behavior in Collaborative Network Learning. |
Edutainment |
2008 |
DBLP DOI BibTeX RDF |
Awareness of role, WF-net, Object, CSCL |
26 | Xianfeng He, Mingtian Wang, Jinlian Zhang, Yongkang Luo |
Role's Functions in CMS. |
CCTA |
2007 |
DBLP DOI BibTeX RDF |
virtual file system, workflow, role, content management system |
26 | Stella Boess, Daniel Saakes, Caroline Hummels |
When is role playing really experiential?: case studies. |
TEI |
2007 |
DBLP DOI BibTeX RDF |
experience, design process, role playing, empathy |
26 | Patrick Ye, Timothy Baldwin |
Semantic role labeling of prepositional phrases. |
ACM Trans. Asian Lang. Inf. Process. |
2006 |
DBLP DOI BibTeX RDF |
Preposition, Semantic Role |
26 | Anil L. Pereira, Vineela Muppavarapu, Soon Myoung Chung |
Role-Based Access Control for Grid Database Services Using the Community Authorization Service. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture-Data Access and Integration (OGSA-DAI), Grid database services, fine-grain authorization, Community Authorization Service (CAS), role-based access control (RBAC) |
26 | Gry Seland |
System designer assessments of role play as a design method: a qualitative study. |
NordiCHI |
2006 |
DBLP DOI BibTeX RDF |
design method, role play, qualitative study, low-fidelity prototyping |
26 | Anders Tychsen, Jonas Heide Smith, Michael Hitchens, Susana Pajares Tosca |
Communication in Multi-player Role Playing Games - The Effect of Medium. |
TIDSE |
2006 |
DBLP DOI BibTeX RDF |
player behaviour, communication, computer-mediated communication, narrative, Role-playing games |
26 | Muhammad Alam, Michael Hafner, Ruth Breu |
A constraint based role based access control in the SECTET a model-driven approach. |
PST |
2006 |
DBLP DOI BibTeX RDF |
service oriented architectures, role based access control, model-driven architecture, model-driven security |
26 | Kristian T. Simsarian |
Take it to the next stage: the roles of role playing in the design process. |
CHI Extended Abstracts |
2003 |
DBLP DOI BibTeX RDF |
bodystorming, participatory design, scenarios, rapid prototyping, collaborative design, role playing, improv |
26 | Mohamed Dahchour, Alain Pirotte 0001, Esteban Zimányi |
A Generic Role Model for Dynamic Objects. |
CAiSE |
2002 |
DBLP DOI BibTeX RDF |
Information modeling, role model, object technology |
26 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Design of a Role-Based Trust-Management Framework. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates |
26 | Gail-Joon Ahn, Ravi S. Sandhu |
Role-based authorization constraints specification. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
role-based access control, access control models, authorization constraints, constraints specification |
25 | Haiyang Sun, Jian Yang 0001, Xin Wang, Yanchun Zhang |
A Verification Mechanism for Secured Message Processing in Business Collaboration. |
APWeb/WAIM |
2009 |
DBLP DOI BibTeX RDF |
Role Authorization, Reliability Verification, Secured Message Processing, Hierarchical Colored Petri Net |
25 | Haibin Zhu, MengChu Zhou |
Role Transfer Problems and Algorithms. |
IEEE Trans. Syst. Man Cybern. Part A |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Wei Dao, Yong Tang 0001, Na Tang, Gaofeng Ji |
Temporal Role Hierarchies. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ryung Chon, Tomoya Enokido, Vlad Wietrzsk, Makoto Takizawa 0001 |
Role Locks to Prevent Illegal Information Flow among Objects. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Hua Wang 0002, Yanchun Zhang, Jinli Cao, Jian Yang |
Specifying Role-Based Access Constraints with Object Constraint Language. |
APWeb |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations. |
WISE |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Linda A. Macaulay |
Seven-Layer Model of the Role of the Facilitator in Requirements Engineering. |
Requir. Eng. |
1999 |
DBLP DOI BibTeX RDF |
Distributed teamwork, Requirements capture, CSCW, Groupware, Facilitation, Facilitator |
24 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
24 | YongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh |
Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. |
APWeb |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Xiaoqin Zhang 0001, Haiping Xu, Bhavesh Shrestha |
Developing multi-agent systems with automatic agent generation and dynamic task allocation mechanisms. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
role-agent mapping, role-based agent development, multi-agent systems, motivations, task allocations |
23 | Scott D. Stoller, Ping Yang 0002, Mikhail I. Gofman, C. R. Ramakrishnan 0001 |
Symbolic reachability analysis for parameterized administrative role based access control. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
parameterized administrative role based access control, security policy analysis |
23 | Weiwei Ding, Baobao Chang |
Fast Semantic Role Labeling for Chinese Based on Semantic Chunking. |
ICCPOL |
2009 |
DBLP DOI BibTeX RDF |
semantic chunking, Chinese semantic role labeling |
23 | Na Zhao 0003, Min Chen 0009, Shu-Ching Chen, Mei-Ling Shyu |
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems. |
ISORC |
2008 |
DBLP DOI BibTeX RDF |
Role-based Access Control, distributed multimedia systems |
23 | Mario Frank 0001, David A. Basin, Joachim M. Buhmann |
A class of probabilistic models for role engineering. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
clustering, machine learning, RBAC, role mining |
23 | Kouji Kozaki, Satoshi Endo, Riichiro Mizoguchi |
Instance Management Problems in the Role Model of Hozo. |
PRICAI |
2008 |
DBLP DOI BibTeX RDF |
instance management, role theory, Ontology, ontology modeling |
23 | Roxanne L. Canosa, Joan M. Lucas |
Mock trials and role-playing in computer ethics courses. |
SIGCSE |
2008 |
DBLP DOI BibTeX RDF |
mock-trials, case studies, ethics, role-playing, debates |
23 | Paul El Khoury, Emmanuel Coquery, Mohand-Said Hacid |
Consistency checking of role assignments in inter-organizational collaboration. |
SPRINGL |
2008 |
DBLP DOI BibTeX RDF |
bridge rules, role based access control, description logic, roles, inter-organizational |
23 | Akhil Kumar 0001, Rong Liu |
A Rule-Based Framework Using Role Patterns for Business Process Compliance. |
RuleML |
2008 |
DBLP DOI BibTeX RDF |
generic role patterns, compliant business process, task categories, declarative approach, Sarbanes-oxley, constraints, rules, separation of duty, internal control, control policies |
23 | Yu Chieh Pan, Liangwen Kuo, Jim Jiunde Lee |
Sociability Design Guidelines for the Online Gaming Community: Role Play and Reciprocity. |
HCI (15) |
2007 |
DBLP DOI BibTeX RDF |
design guideline, role play, reciprocity, sociability |
23 | Ali E. Abdallah, Etienne J. Khayat |
Formal Z Specifications of Several Flat Role-Based Access Control Models. |
SEW |
2006 |
DBLP DOI BibTeX RDF |
Authorization, Role-Based Access Control, Formal Models, Z specification |
23 | Jirí Fiala 0001, Daniël Paulusma |
The Computational Complexity of the Role Assignment Problem. |
ICALP |
2003 |
DBLP DOI BibTeX RDF |
role assignment 2002 Mathematics Subject Classification: 05C15, computational complexity, 03D15, graph homomorphism |
23 | C. Joncheng Kuo, Polar Humenn |
Dynamically authorized role-based access control for secure distributed computation. |
XML Security |
2002 |
DBLP DOI BibTeX RDF |
XML-based security assertions, authorization domain, CORBA, Role-based access control, attribute certificates |
23 | Dae-Kyoo Kim, Robert B. France, Sudipto Ghosh, Eunjee Song |
Using Role-Based Modeling Language (RBML) to Characterize Model Families. |
ICECCS |
2002 |
DBLP DOI BibTeX RDF |
Object-oriented design models, role-based modeling language, UML, software reuse |
23 | Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer |
Configuring role-based access control to enforce mandatory and discretionary access control policies. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
lattice-based access control, role-based access control, mandatory access control, discretionary access control |
23 | Tae-Hoon Kim 0001, Yeong-Gil Shin |
Role-based Decomposition for Improving Concurrency in Distributed Object-Oriented Software Development Environments. |
COMPSAC |
1999 |
DBLP DOI BibTeX RDF |
CSCW, Decomposition, Role, Software Development Environment |
23 | Li-ming Wang, Ya-chong Li |
A Systematic Methodology for Adaptive Systems in Open Environments. |
PRIMA |
2006 |
DBLP DOI BibTeX RDF |
Organization Rule, Role Space, Adaptive Systems, Open Environments |
23 | Staffan Jonsson, Markus Montola, Annika Waern, Martin Ericsson |
Prosopopeia: experiences from a pervasive Larp. |
Advances in Computer Entertainment Technology |
2006 |
DBLP DOI BibTeX RDF |
live role play, pervasive computing, pervasive game, alternate reality game |
23 | Rajnish Kumar, Matthew Wolenetz, Bikash Agarwalla, JunSuk Shin, Phillip W. Hutto, Arnab Paul, Umakishore Ramachandran |
DFuse: a framework for distributed data fusion. |
SenSys |
2003 |
DBLP DOI BibTeX RDF |
sensor network, middleware, data fusion, platform, energy awareness, in-network aggregation, role assignment |
23 | Zixue Cheng, Tongjun Huang, Norio Shiratori |
A distributed algorithm for implementation of first-order multiparty interactions. |
ICPADS |
1996 |
DBLP DOI BibTeX RDF |
multiparty synchronization, first-order multiparty interactions, role manager, computational complexity, distributed algorithms, distributed algorithm, communication complexity, multiparty interactions |
22 | Sebnem Bora, Oguz Dikenelli |
Replication Based on Role Concept for Multi-Agent Systems. |
ESAW |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Liang Chen, Jason Crampton |
Applications of the Oriented Permission Role-Based Access Control Model. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Valeria Loscrì, Vincenzo Mantuano |
A mobility prediction model for a role management dynamic algorithm for wireless sensor networks. |
Sensor and Actor Networks |
2007 |
DBLP DOI BibTeX RDF |
ESR, RMA, sensor networks, energy, lifetime, EMAC |
22 | Haibin Zhu, Rob Alkins |
A tool for role-based chatting. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Yusuke Fukazawa, Takefumi Naganuma, Kunihiro Fujii, Shoji Kurakake |
Construction and Use of Role-Ontology for Task-Based Service Navigation System. |
ISWC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | In-Cheol Kim |
Dynamic Role Assignment for Multi-agent Cooperation. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Guido Boella, Leendert W. N. van der Torre |
Role-based Rights in Arti.cial Social Systems. |
IAT |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Sejong Oh |
New Concept of Authority Range for Flexible Management of Role Hierarchy. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
22 | HyungHyo Lee, YoungLok Lee, BongNam Noh |
A Framework for Modeling Organization Structure in Role Engineering. |
PARA |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Viktor Kuncak, Patrick Lam 0001, Martin C. Rinard |
Role analysis. |
POPL |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Robert Law |
Using student blogs for documentation in software development projects. |
ITiCSE |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Hector Ouilhet |
Google Sky Map: using your phone as an interface. |
Mobile HCI |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Jean Bacon, Ken Moody, Walt Yao |
Access Control and Trust in the Use of Widely Distributed Services. |
Middleware |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Georg Gottlob, Michael Schrefl, Brigitte Röck |
Extending Object-Oriented Systems with Roles. |
ACM Trans. Inf. Syst. |
1996 |
DBLP DOI BibTeX RDF |
|
21 | Wenguang Wang, Andreas Tolk, Weiping Wang 0002 |
The levels of conceptual interoperability model: applying systems engineering principles to M&S. |
SpringSim |
2009 |
DBLP DOI BibTeX RDF |
descriptive role, levels of conceptual interoperability model (LCIM), prescriptive role, systems engineering |
21 | Kyootai Lee, Kailash Joshi, Youngkyun Kim, JooYeoun Lee |
A proposed investigation of the is employee job context. |
CPR |
2008 |
DBLP DOI BibTeX RDF |
IS context and role ambiguity, role conflict, turnover intention, job satisfaction, organizational commitment |
Displaying result #201 - #300 of 44182 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|