共 50 条
- [1] INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (02): : 139 - 143
- [3] CONTROLLING THE DEPENDENCY OF USER ACCESS-CONTROL MECHANISMS ON CORRECTNESS OF USER IDENTIFICATION [J]. COMPUTER JOURNAL, 1988, 31 (06): : 503 - 509
- [5] ANALYSIS AND IMPROVEMENT OF AN ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05): : 271 - 273
- [8] A User Study of Policy Creation in a Flexible Access-Control System [J]. CHI 2008: 26TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2008, : 543 - 552
- [9] ACCESS-CONTROL OF BURSTY VOICE TRAFFIC IN ATM NETWORKS [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1995, 27 (10): : 1411 - 1427
- [10] AUTHENTICATION AND DISCRETIONARY ACCESS-CONTROL IN COMPUTER-NETWORKS [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1985, 10 (01): : 27 - 37