PREVENTING UNAUTHORIZED USE OF SYSTEMS

被引:0
|
作者
MEISSNER, P [1 ]
机构
[1] NBS,INST COMP SCI & TECHNOL,WASHINGTON,DC 20234
来源
DATA PROCESSING | 1977年 / 19卷 / 07期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:42 / 43
页数:2
相关论文
共 50 条
  • [41] Identification Security at Unauthorized Use of Information System
    Kaur, Navpreet
    Rao, Dhawaleswar
    [J]. International Journal of Computer Science and Network Security, 2016, 16 (01): : 72 - 76
  • [42] DETERRING UNAUTHORIZED USE OF HANDICAPPED PARKING SPACES
    WHITE, GW
    JONES, ML
    ULICNY, GR
    POWELL, LK
    MATHEWS, RM
    [J]. REHABILITATION PSYCHOLOGY, 1988, 33 (04) : 207 - 212
  • [43] UNAUTHORIZED USE OF DOCTOR TITLE BY PHYSICIANS OR MEDICAL ASSISTANTS
    KOHLHAAS, M
    [J]. DEUTSCHE MEDIZINISCHE WOCHENSCHRIFT, 1967, 92 (46) : 2139 - &
  • [44] Compassionate use of unauthorized drugs: Legal and ethical considerations
    Tsagkaris, Christos
    Kalachanis, Konstantinos
    [J]. EUROPEAN JOURNAL OF INTERNAL MEDICINE, 2020, 72 : 96 - 96
  • [45] Unauthorized groundwater use: institutional, social and ethical considerations
    De Stefano, Lucia
    Lopez-Gunn, Elena
    [J]. WATER POLICY, 2012, 14 : 147 - 160
  • [46] Unauthorized and Unwise: The Lawful Use Requirement in Trademark Law
    Mikos, Robert A.
    [J]. VANDERBILT LAW REVIEW, 2022, 75 (01) : 161 - 237
  • [47] Estimation of stability of automated systems during unauthorized access
    Shlyakhin, AV
    [J]. IZVESTIYA VYSSHIKH UCHEBNYKH ZAVEDENII RADIOELEKTRONIKA, 2000, 43 (3-4): : 27 - 32
  • [48] Honeypot Based Unauthorized Data Access Detection in MapReduce Systems
    Ulusoy, Huseyin
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    Khan, Latifur
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 126 - 131
  • [49] Unauthorized Use of Psychopharmaceuticals: The new Royal Decree 1015/2009
    Medrano, Juan
    Pacheco, Luis
    Jose Zardoya, Ma
    [J]. NORTE DE SALUD MENTAL, 2009, 8 (35): : 79 - 88