DOES LICENSING REQUIRE NEW ACCESS-CONTROL TECHNIQUES

被引:1
|
作者
HAUSER, R [1 ]
机构
[1] UNIV ZURICH,DEPT COMP SCI,ZURICH,SWITZERLAND
关键词
Computer software;
D O I
10.1145/188280.188295
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
[No abstract available]
引用
收藏
页码:48 / 55
页数:8
相关论文
共 50 条
  • [21] THE SOURCE OF AUTHORITY FOR COMMERCIAL ACCESS-CONTROL
    MOFFETT, JD
    SLOMAN, MS
    COMPUTER, 1988, 21 (02) : 59 - 69
  • [22] A Decade of OS Access-Control Extensibility
    Watson, Robert N. M.
    COMMUNICATIONS OF THE ACM, 2013, 56 (02) : 52 - 63
  • [23] Access-control language for multidomain environments
    Joshi, JBD
    Bhatti, R
    Bertino, E
    Ghafoor, A
    IEEE INTERNET COMPUTING, 2004, 8 (06) : 40 - 50
  • [24] ACCESS-CONTROL FOR COMPUTER-SYSTEMS
    FARQUHAR, W
    INFORMATION AGE, 1985, 7 (01): : 25 - 29
  • [25] ACCESS-CONTROL METHODS OF VAX/VMS
    REISINGER, DA
    INFORMATION AGE, 1988, 10 (03): : 162 - 168
  • [26] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [27] SMART CARD AND ACCESS-CONTROL SYSTEMS
    LEMARCHANT, P
    ACTA ELECTRONICA, 1983, 25 (01): : 93 - 98
  • [28] INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
    HARN, L
    LIN, HY
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (02): : 139 - 143
  • [29] CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL
    BOOYSEN, HAS
    ELOFF, JHP
    COMPUTERS & SECURITY, 1995, 14 (03) : 251 - 265
  • [30] ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS
    LOPRIORE, L
    TSI-TECHNIQUE ET SCIENCE INFORMATIQUES, 1984, 3 (03): : 179 - 191