Part IV. SCAM Framework
Prev
Next
SCAM Framework
Table of Contents
11.
Repository
Metadata model
Security
Authentication
Access Control
API
Searching
RDQL
Freetext
Backup/restore data
Database
12.
Middleware
Functional Requirements
Architecture
Design Discussion
Command Chain
Scope
Functional Requirements
Architecture
Design Descussion