SECURE ACCESS-CONTROL AND MAC-BASED SIGNATURES

被引:0
|
作者
BEKER, H
机构
来源
INFORMATION AGE | 1988年 / 10卷 / 01期
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:20 / 22
页数:3
相关论文
共 50 条
  • [31] DOMAIN-BASED ACCESS-CONTROL FOR DISTRIBUTED COMPUTING SYSTEMS
    ROBINSON, DC
    SLOMAN, MS
    SOFTWARE ENGINEERING JOURNAL, 1988, 3 (05): : 161 - 170
  • [32] Distributed proving in access-control systems
    Bauer, L
    Gartiss, S
    Reiter, MK
    2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, : 81 - 95
  • [33] Mac-based imaging systems welcome windows users
    Imaging Magazine, 1993, 2 (12):
  • [34] DYNAMIC ACCESS-CONTROL FOR RELATIONAL VIEWS
    ROUSSOPOULOS, N
    BADER, C
    INFORMATION SYSTEMS, 1985, 10 (03) : 361 - 369
  • [35] THE SOURCE OF AUTHORITY FOR COMMERCIAL ACCESS-CONTROL
    MOFFETT, JD
    SLOMAN, MS
    COMPUTER, 1988, 21 (02) : 59 - 69
  • [36] A Decade of OS Access-Control Extensibility
    Watson, Robert N. M.
    COMMUNICATIONS OF THE ACM, 2013, 56 (02) : 52 - 63
  • [37] Access-control language for multidomain environments
    Joshi, JBD
    Bhatti, R
    Bertino, E
    Ghafoor, A
    IEEE INTERNET COMPUTING, 2004, 8 (06) : 40 - 50
  • [38] ACCESS-CONTROL FOR COMPUTER-SYSTEMS
    FARQUHAR, W
    INFORMATION AGE, 1985, 7 (01): : 25 - 29
  • [39] ACCESS-CONTROL METHODS OF VAX/VMS
    REISINGER, DA
    INFORMATION AGE, 1988, 10 (03): : 162 - 168
  • [40] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734