메뉴 건너뛰기




Volumn 28, Issue 1, 1996, Pages 241-243

Authentication, Access Control, and Audit

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0000052619     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/234313.234412     Document Type: Article
Times cited : (103)

References (7)
  • 1
    • 3142533901 scopus 로고
    • Logical design of audit information in relational databases
    • Abrams, Jajodia, and Podell, Eds. IEEE Computer Society Press, Los Alamitos, CA
    • Jajodia, S., Gadia, S., and Bhargava, G. 1995. Logical design of audit information in relational databases. In Information Security: An Integrated Collection of Essays. Abrams, Jajodia, and Podell, Eds. IEEE Computer Society Press, Los Alamitos, CA, 585-595.
    • (1995) Information Security: An Integrated Collection of Essays , pp. 585-595
    • Jajodia, S.1    Gadia, S.2    Bhargava, G.3
  • 3
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • Lunt, T. F. 1993. A survey of intrusion detection techniques. Comput. Security 12 405-418.
    • (1993) Comput. Security , vol.12 , pp. 405-418
    • Lunt, T.F.1
  • 5
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R. S. 1993. Lattice-based access control models. IEEE Computer 26 11, 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 6
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sandhu, R. S. and Samarati, P. 1994. Access control: Principles and practice. IEEE Communications 32 9, 40-48.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.