SECURE USER ACCESS-CONTROL FOR PUBLIC NETWORKS

被引:0
|
作者
LEE, PJ
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:46 / 57
页数:12
相关论文
共 50 条
  • [1] INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
    HARN, L
    LIN, HY
    [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (02): : 139 - 143
  • [2] SECURE ACCESS-CONTROL AND MAC-BASED SIGNATURES
    BEKER, H
    [J]. INFORMATION AGE, 1988, 10 (01): : 20 - 22
  • [3] CONTROLLING THE DEPENDENCY OF USER ACCESS-CONTROL MECHANISMS ON CORRECTNESS OF USER IDENTIFICATION
    OSHEA, G
    [J]. COMPUTER JOURNAL, 1988, 31 (06): : 503 - 509
  • [4] THE DESIGN OF DYNAMIC ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 25 (07) : 27 - 32
  • [5] ANALYSIS AND IMPROVEMENT OF AN ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05): : 271 - 273
  • [6] A CRYPTOGRAPHIC IMPLEMENTATION FOR DYNAMIC ACCESS-CONTROL IN A USER HIERARCHY
    TSAI, HM
    CHANG, CC
    [J]. COMPUTERS & SECURITY, 1995, 14 (02) : 159 - 166
  • [7] AN END-USER DATA ACCESS-CONTROL FRAMEWORK
    GILLENSON, ML
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 1993, 34 (01) : 63 - 66
  • [8] A User Study of Policy Creation in a Flexible Access-Control System
    Bauer, Lujo
    Cranor, Lorrie Faith
    Reeder, Robert W.
    Reiter, Michael K.
    Vaniea, Kami
    [J]. CHI 2008: 26TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2008, : 543 - 552
  • [9] ACCESS-CONTROL OF BURSTY VOICE TRAFFIC IN ATM NETWORKS
    HABIB, IW
    SAADAWI, TN
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1995, 27 (10): : 1411 - 1427
  • [10] AUTHENTICATION AND DISCRETIONARY ACCESS-CONTROL IN COMPUTER-NETWORKS
    KARGER, PA
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1985, 10 (01): : 27 - 37