ACCESS-CONTROL SOFTWARE

被引:0
|
作者
FRIEDMAN, M
机构
来源
INFORMATION AGE | 1988年 / 10卷 / 03期
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:157 / 161
页数:5
相关论文
共 50 条
  • [41] ON THE ACCESS-CONTROL MECHANISM OF THE PROGRAM COMPONENT MANAGER
    SILBERSCHATZ, A
    SOFTWARE-PRACTICE & EXPERIENCE, 1981, 11 (02): : 159 - 166
  • [42] ACCESS-CONTROL WITH SINGLE-KEY-LOCK
    WU, ML
    HWANG, TY
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1984, 10 (02) : 185 - 191
  • [43] A BUILDING ACCESS-CONTROL SYSTEM WITH ALARM MONITORING
    SANZ, JV
    VIVES, JQ
    DELCAMPO, AF
    MICROPROCESSING AND MICROPROGRAMMING, 1983, 12 (02): : 111 - 114
  • [44] LedgerView: Access-Control Views on Hyperledger Fabric
    Ruan, Pingcheng
    Kanza, Yaron
    Ooi, Beng Chin
    Srivastava, Divesh
    PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (SIGMOD '22), 2022, : 2218 - 2231
  • [45] ACCESS-CONTROL BY MEANS OF AUTOMATIC SPEAKER VERIFICATION
    KUHN, MH
    JOURNAL OF PHYSICS E-SCIENTIFIC INSTRUMENTS, 1980, 13 (01): : 85 - 86
  • [47] ON THE STATIC ACCESS-CONTROL MECHANISM IN CONCURRENT PASCAL
    KIEBURTZ, R
    SILBERSCHATZ, A
    COMPUTER JOURNAL, 1982, 25 (01): : 17 - 21
  • [48] Real Life Challenges in Access-control Management
    Bauer, Lujo
    Cranor, Lorrie Faith
    Reeder, Robert W.
    Reiter, Michael K.
    Vaniea, Karni
    CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, 2009, : 899 - 908
  • [49] An access-control framework for WS-BPEL
    Paci, Federica
    Bertino, Elisa
    Crampton, Jason
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2008, 5 (03) : 20 - 43
  • [50] CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
    AKL, SG
    TAYLOR, PD
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 239 - 248