ACCESS-CONTROL SOFTWARE

被引:0
|
作者
FRIEDMAN, M
机构
来源
INFORMATION AGE | 1988年 / 10卷 / 03期
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:157 / 161
页数:5
相关论文
共 50 条
  • [21] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [22] SMART CARD AND ACCESS-CONTROL SYSTEMS
    LEMARCHANT, P
    ACTA ELECTRONICA, 1983, 25 (01): : 93 - 98
  • [23] INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
    HARN, L
    LIN, HY
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (02): : 139 - 143
  • [24] CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL
    BOOYSEN, HAS
    ELOFF, JHP
    COMPUTERS & SECURITY, 1995, 14 (03) : 251 - 265
  • [25] ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS
    LOPRIORE, L
    TSI-TECHNIQUE ET SCIENCE INFORMATIQUES, 1984, 3 (03): : 179 - 191
  • [26] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [27] ACCESS-CONTROL FOR PRIVATE DECLARATIONS IN ADA
    SHEN, J
    CORMACK, GV
    COMPUTER LANGUAGES, 1994, 20 (02): : 117 - 126
  • [28] A DEFINITION OF AN ACCESS-CONTROL SYSTEMS LANGUAGE
    EMMS, J
    COMPUTER STANDARDS & INTERFACES, 1987, 6 (04) : 443 - 454
  • [29] ACCESS-CONTROL AND MANAGEMENT IN MULTILEVEL DATABASE MODELS
    BUSSOLATI, U
    MARTELLA, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1981, 123 : 225 - 235
  • [30] CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL
    SANDHU, RS
    INFORMATION PROCESSING LETTERS, 1988, 27 (02) : 95 - 98