SECURE ACCESS-CONTROL AND MAC-BASED SIGNATURES

被引:0
|
作者
BEKER, H
机构
来源
INFORMATION AGE | 1988年 / 10卷 / 01期
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:20 / 22
页数:3
相关论文
共 50 条
  • [41] SMART CARD AND ACCESS-CONTROL SYSTEMS
    LEMARCHANT, P
    ACTA ELECTRONICA, 1983, 25 (01): : 93 - 98
  • [42] INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
    HARN, L
    LIN, HY
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (02): : 139 - 143
  • [43] CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL
    BOOYSEN, HAS
    ELOFF, JHP
    COMPUTERS & SECURITY, 1995, 14 (03) : 251 - 265
  • [44] ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS
    LOPRIORE, L
    TSI-TECHNIQUE ET SCIENCE INFORMATIQUES, 1984, 3 (03): : 179 - 191
  • [45] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [46] ACCESS-CONTROL FOR PRIVATE DECLARATIONS IN ADA
    SHEN, J
    CORMACK, GV
    COMPUTER LANGUAGES, 1994, 20 (02): : 117 - 126
  • [47] A DEFINITION OF AN ACCESS-CONTROL SYSTEMS LANGUAGE
    EMMS, J
    COMPUTER STANDARDS & INTERFACES, 1987, 6 (04) : 443 - 454
  • [48] Mac-based mode-tracking in structural topology optimization
    Kim, TS
    Kim, YY
    COMPUTERS & STRUCTURES, 2000, 74 (03) : 375 - 383
  • [49] A DYNAMIC ACCESS-CONTROL SCHEME BASED UPON THE KNAPSACK-PROBLEM
    JAN, JK
    WANG, SJ
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (12) : 75 - 86
  • [50] Task-and-role-based access-control model for computational grid
    龙涛
    JournalofChongqingUniversity(EnglishEdition), 2007, (04) : 249 - 255