INTEGRATION OF BIOMETRICS IN PORTALS FOR ACCESS-CONTROL WITH DISTRIBUTED PROCESS

被引:0
|
作者
SMART, DC
LABARILE, PM
机构
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:B93 / B108
页数:16
相关论文
共 50 条
  • [1] BIOMETRICS, IS IT A VIABLE PROPOSITION FOR IDENTITY AUTHENTICATION AND ACCESS-CONTROL
    KIM, HJ
    [J]. COMPUTERS & SECURITY, 1995, 14 (03) : 205 - 214
  • [2] Distributed proving in access-control systems
    Bauer, L
    Gartiss, S
    Reiter, MK
    [J]. 2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, : 81 - 95
  • [3] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [4] INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
    HARN, L
    LIN, HY
    [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (02): : 139 - 143
  • [5] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [6] ACCESS-CONTROL AND SECURITY FOR A DISTRIBUTED CONTROL-SYSTEM
    MEYER, J
    GOTZ, A
    KLOTZ, WD
    [J]. NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 1994, 352 (1-2): : 289 - 292
  • [7] SPECIFYING DISCRETIONARY ACCESS-CONTROL POLICY FOR DISTRIBUTED SYSTEMS
    MOFFETT, J
    SLOMAN, M
    TWIDLE, K
    [J]. COMPUTER COMMUNICATIONS, 1990, 13 (09) : 571 - 580
  • [8] DISTRIBUTED ASSIGNMENT OF CRYPTOGRAPHIC KEYS FOR ACCESS-CONTROL IN A HIERARCHY
    SHAO, BM
    HWANG, JJ
    WANG, PC
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 79 - 84
  • [9] Efficient proving for practical distributed access-control systems
    Bauer, Lujo
    Garriss, Scott
    Reiter, Michael K.
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 19 - +
  • [10] CONTEXT-DEPENDENT ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    STRACK, H
    LAM, KY
    [J]. COMPUTER SECURITY, 1993, 37 : 137 - 155