ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS

被引:0
|
作者
LOPRIORE, L [1 ]
机构
[1] IST ELABORAZ INFORMAZ,I-56100 PISA,ITALY
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:179 / 191
页数:13
相关论文
共 50 条
  • [41] IMPROVEMENTS TO INTERNET ACCESS-CONTROL SECURITY SCHEME
    POON, FSF
    ERTAUL, L
    ENGLISH, MJ
    ELECTRONICS LETTERS, 1992, 28 (13) : 1250 - 1251
  • [42] A BUILDING ACCESS-CONTROL SYSTEM WITH ALARM MONITORING
    SANZ, JV
    VIVES, JQ
    DELCAMPO, AF
    MICROPROCESSING AND MICROPROGRAMMING, 1983, 12 (02): : 111 - 114
  • [43] Automatic Error Finding in Access-Control Policies
    Jayaraman, Karthick
    Ganesh, Vijay
    Tripunitara, Mahesh
    Rinard, Martin
    Chapin, Steve
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 163 - 174
  • [44] ACCESS-CONTROL WITH SINGLE-KEY-LOCK
    WU, ML
    HWANG, TY
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1984, 10 (02) : 185 - 191
  • [45] STRUCTURE FOR ACCESS CONTROL LISTS
    STIEGLER, HG
    SOFTWARE-PRACTICE & EXPERIENCE, 1979, 9 (10): : 813 - 819
  • [46] ON THE STATIC ACCESS-CONTROL MECHANISM IN CONCURRENT PASCAL
    KIEBURTZ, R
    SILBERSCHATZ, A
    COMPUTER JOURNAL, 1982, 25 (01): : 17 - 21
  • [47] LedgerView: Access-Control Views on Hyperledger Fabric
    Ruan, Pingcheng
    Kanza, Yaron
    Ooi, Beng Chin
    Srivastava, Divesh
    PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (SIGMOD '22), 2022, : 2218 - 2231
  • [48] ACCESS-CONTROL BY MEANS OF AUTOMATIC SPEAKER VERIFICATION
    KUHN, MH
    JOURNAL OF PHYSICS E-SCIENTIFIC INSTRUMENTS, 1980, 13 (01): : 85 - 86
  • [49] Real Life Challenges in Access-control Management
    Bauer, Lujo
    Cranor, Lorrie Faith
    Reeder, Robert W.
    Reiter, Michael K.
    Vaniea, Karni
    CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, 2009, : 899 - 908