SCAM Framework

Table of Contents

11. Repository
Metadata model
Security
Authentication
Access Control
API
Searching
RDQL
Freetext
Backup/restore data
Database
12. Middleware
Functional Requirements
Architecture
Design Discussion
Command Chain
Scope
Functional Requirements
Architecture
Design Descussion