DOES LICENSING REQUIRE NEW ACCESS-CONTROL TECHNIQUES

被引:1
|
作者
HAUSER, R [1 ]
机构
[1] UNIV ZURICH,DEPT COMP SCI,ZURICH,SWITZERLAND
关键词
Computer software;
D O I
10.1145/188280.188295
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
[No abstract available]
引用
收藏
页码:48 / 55
页数:8
相关论文
共 50 条
  • [1] ARCHITECTURAL ACCESS-CONTROL
    KNOPP, SL
    PROGRESSIVE ARCHITECTURE, 1988, 69 (04): : 146 - &
  • [2] ACCESS-CONTROL SOFTWARE
    FRIEDMAN, M
    INFORMATION AGE, 1988, 10 (03): : 157 - 161
  • [3] A NEW ACCESS-CONTROL METHOD USING PRIME FACTORIZATION
    HWANG, JJ
    SHAO, BM
    WANG, PC
    COMPUTER JOURNAL, 1992, 35 (01): : 16 - 20
  • [4] ACCESS-CONTROL WITH BINARY KEYS
    CHANG, CC
    SHEN, JJ
    WU, TC
    COMPUTERS & SECURITY, 1994, 13 (08) : 681 - 686
  • [5] LANGUAGE FEATURES FOR ACCESS-CONTROL
    ANCILOTTI, P
    BOARI, M
    LIJTMAER, N
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1983, 9 (01) : 16 - 25
  • [6] ACCESS-CONTROL - PRINCIPLES AND PRACTICE
    SANDHU, RS
    SAMARATI, P
    IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) : 40 - 48
  • [7] DATA ACCESS-CONTROL MODEL
    PINKERTON, JMM
    INFORMATION PRIVACY, 1981, 3 (05): : 181 - 185
  • [8] ACCESS-CONTROL AND AUTHENTICATION IN LANS
    GASSER, M
    LOCAL AREA NETWORK SECURITY, 1989, 396 : 19 - 29
  • [9] ACCESS-CONTROL SYSTEMS FOR SECURITY
    MENKUS, B
    OFFICE ADMINISTRATION AND AUTOMATION, 1984, 45 (04): : 57 - &
  • [10] PROPOSAL OF NEW RING ACCESS-CONTROL AND CONNECTION ADMISSION CONTROL METHOD
    KUBOTA, K
    YOKOTA, H
    TANAKA, T
    ELECTRONICS LETTERS, 1993, 29 (08) : 687 - 688