ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS

被引:0
|
作者
LOPRIORE, L [1 ]
机构
[1] IST ELABORAZ INFORMAZ,I-56100 PISA,ITALY
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:179 / 191
页数:13
相关论文
共 50 条
  • [31] CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL
    SANDHU, RS
    INFORMATION PROCESSING LETTERS, 1988, 27 (02) : 95 - 98
  • [32] ACCESS-CONTROL AND SECURITY FOR A DISTRIBUTED CONTROL-SYSTEM
    MEYER, J
    GOTZ, A
    KLOTZ, WD
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 1994, 352 (1-2): : 289 - 292
  • [33] Effective visualization of file system access-control
    Heitzmann, Alexander
    Palazzi, Bernardo
    Papamanthou, Charalampos
    Tamassia, Roberto
    VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 18 - 25
  • [34] A TDMA BASED ACCESS-CONTROL SCHEME FOR APONS
    ANGELOPOULOS, JD
    VENIERIS, IS
    STASSINOPOULOS, GI
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 1993, 11 (5-6) : 1095 - 1103
  • [35] Flexible meta access-control for collaborative applications
    Univ of North Carolina, Chapel Hill, NC, United States
    Proc ACM Conf Comput Support Coop Work, (247-256):
  • [36] TYPICAL SYSTEM ACCESS-CONTROL PROBLEMS AND SOLUTIONS
    KARREN, DT
    INFORMATION AGE, 1988, 10 (01): : 23 - 32
  • [37] LOCAL AREA NETWORK - MEDIUM ACCESS-CONTROL
    ROLIN, P
    ONDE ELECTRIQUE, 1989, 69 (05): : 14 - 21
  • [38] ACCESS-CONTROL SYSTEMS FOR RADIOTHERAPY TREATMENT ROOMS
    ALDRICH, JE
    BERKEY, J
    MEDICAL PHYSICS, 1988, 15 (06) : 930 - 931
  • [39] A general and flexible access-control system for the web
    Bauer, L
    Schneider, MA
    Felten, EW
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 93 - 108
  • [40] Automatic Error Finding in Access-Control Policies
    Jayaraman, Karthick
    Ganesh, Vijay
    Tripunitara, Mahesh
    Rinard, Martin
    Chapin, Steve
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 163 - 174