首页
学术期刊
论文检测
AIGC检测
热点
更多
数据
ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS
被引:0
|
作者
:
LOPRIORE, L
论文数:
0
引用数:
0
h-index:
0
机构:
IST ELABORAZ INFORMAZ,I-56100 PISA,ITALY
IST ELABORAZ INFORMAZ,I-56100 PISA,ITALY
LOPRIORE, L
[
1
]
机构
:
[1]
IST ELABORAZ INFORMAZ,I-56100 PISA,ITALY
来源
:
TSI-TECHNIQUE ET SCIENCE INFORMATIQUES
|
1984年
/ 3卷
/ 03期
关键词
:
D O I
:
暂无
中图分类号
:
TP [自动化技术、计算机技术];
学科分类号
:
0812 ;
摘要
:
引用
收藏
页码:179 / 191
页数:13
相关论文
共 50 条
[1]
Access control lists in password capability environments
Lopriore, Lanfranco
论文数:
0
引用数:
0
h-index:
0
机构:
Univ Pisa, Dipartimento Ingn Informaz, Via G Caruso 16, I-56126 Pisa, Italy
Univ Pisa, Dipartimento Ingn Informaz, Via G Caruso 16, I-56126 Pisa, Italy
Lopriore, Lanfranco
COMPUTERS & SECURITY,
2016,
62
: 317
-
327
[2]
Access-control language for multidomain environments
Joshi, JBD
论文数:
0
引用数:
0
h-index:
0
机构:
Univ Pittsburgh, LERSAIS, Pittsburgh, PA 15260 USA
Univ Pittsburgh, LERSAIS, Pittsburgh, PA 15260 USA
Joshi, JBD
Bhatti, R
论文数:
0
引用数:
0
h-index:
0
机构:
Univ Pittsburgh, LERSAIS, Pittsburgh, PA 15260 USA
Bhatti, R
Bertino, E
论文数:
0
引用数:
0
h-index:
0
机构:
Univ Pittsburgh, LERSAIS, Pittsburgh, PA 15260 USA
Bertino, E
Ghafoor, A
论文数:
0
引用数:
0
h-index:
0
机构:
Univ Pittsburgh, LERSAIS, Pittsburgh, PA 15260 USA
Ghafoor, A
IEEE INTERNET COMPUTING,
2004,
8
(06)
: 40
-
50
[3]
ARCHITECTURAL ACCESS-CONTROL
KNOPP, SL
论文数:
0
引用数:
0
h-index:
0
KNOPP, SL
PROGRESSIVE ARCHITECTURE,
1988,
69
(04):
: 146
-
&
[4]
ACCESS-CONTROL SOFTWARE
FRIEDMAN, M
论文数:
0
引用数:
0
h-index:
0
FRIEDMAN, M
INFORMATION AGE,
1988,
10
(03):
: 157
-
161
[5]
LANGUAGE FEATURES FOR ACCESS-CONTROL
ANCILOTTI, P
论文数:
0
引用数:
0
h-index:
0
机构:
UNIV BOLOGNA,IST AUTOMAT,I-40136 BOLOGNA,ITALY
UNIV BOLOGNA,IST AUTOMAT,I-40136 BOLOGNA,ITALY
ANCILOTTI, P
BOARI, M
论文数:
0
引用数:
0
h-index:
0
机构:
UNIV BOLOGNA,IST AUTOMAT,I-40136 BOLOGNA,ITALY
UNIV BOLOGNA,IST AUTOMAT,I-40136 BOLOGNA,ITALY
BOARI, M
LIJTMAER, N
论文数:
0
引用数:
0
h-index:
0
机构:
UNIV BOLOGNA,IST AUTOMAT,I-40136 BOLOGNA,ITALY
UNIV BOLOGNA,IST AUTOMAT,I-40136 BOLOGNA,ITALY
LIJTMAER, N
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1983,
9
(01)
: 16
-
25
[6]
ACCESS-CONTROL WITH BINARY KEYS
CHANG, CC
论文数:
0
引用数:
0
h-index:
0
机构:
CHUNG SUNG INST SCI & TECHNOL,CTR AEROSP IND DEV,TAICHUNG 407,TAIWAN
CHANG, CC
SHEN, JJ
论文数:
0
引用数:
0
h-index:
0
机构:
CHUNG SUNG INST SCI & TECHNOL,CTR AEROSP IND DEV,TAICHUNG 407,TAIWAN
SHEN, JJ
WU, TC
论文数:
0
引用数:
0
h-index:
0
机构:
CHUNG SUNG INST SCI & TECHNOL,CTR AEROSP IND DEV,TAICHUNG 407,TAIWAN
WU, TC
COMPUTERS & SECURITY,
1994,
13
(08)
: 681
-
686
[7]
ACCESS-CONTROL - PRINCIPLES AND PRACTICE
SANDHU, RS
论文数:
0
引用数:
0
h-index:
0
机构:
UNIV MILAN,I-20122 MILAN,ITALY
UNIV MILAN,I-20122 MILAN,ITALY
SANDHU, RS
论文数:
引用数:
h-index:
机构:
SAMARATI, P
IEEE COMMUNICATIONS MAGAZINE,
1994,
32
(09)
: 40
-
48
[8]
DATA ACCESS-CONTROL MODEL
PINKERTON, JMM
论文数:
0
引用数:
0
h-index:
0
PINKERTON, JMM
INFORMATION PRIVACY,
1981,
3
(05):
: 181
-
185
[9]
ACCESS-CONTROL AND AUTHENTICATION IN LANS
GASSER, M
论文数:
0
引用数:
0
h-index:
0
GASSER, M
LOCAL AREA NETWORK SECURITY,
1989,
396
: 19
-
29
[10]
ACCESS-CONTROL SYSTEMS FOR SECURITY
MENKUS, B
论文数:
0
引用数:
0
h-index:
0
MENKUS, B
OFFICE ADMINISTRATION AND AUTOMATION,
1984,
45
(04):
: 57
-
&
←
1
2
3
4
5
→