-
1
-
-
0027667638
-
A Calculus for Access Control in Distributed Systems
-
[Abadi 1993]
-
[Abadi 1993] M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, A Calculus for Access Control in Distributed Systems, ACM Trans. Prog. Lang. and Sys. 15(4), 706-734, (1993).
-
(1993)
ACM Trans. Prog. Lang. and Sys.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
0003510333
-
Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process
-
[Bearman 1998] June
-
[Bearman 1998] D. Bearman and J. Trant, Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process, D-LIB on-line magazine, (June 1998).
-
(1998)
D-LIB On-line Magazine
-
-
Bearman, D.1
Trant, J.2
-
4
-
-
0029719907
-
Authorization in the Digital Library: Secure Access to Services across Enterprise Boundaries
-
[Ching 1996]
-
[Ching 1996] N. Ching, V. Jones, and M. Winslett, Authorization in the Digital Library: Secure Access to Services across Enterprise Boundaries, IEEE Proc. ADL '96, 110-119, (1996).
-
(1996)
IEEE Proc. ADL '96
, pp. 110-119
-
-
Ching, N.1
Jones, V.2
Winslett, M.3
-
5
-
-
0029723574
-
A Digital Library System for Periodicals Distribution
-
[Choy 1996] May Reprinted IEEE Computer Society Press, Los Alamitos, Calif.
-
[Choy 1996] D.M. Choy, J.B. Lotspiech, L.C. Anderson, S.K. Boyer, R. Dievendorff, C. Dwork, T.D. Griffin, B.A. Hoenig, M.K. Jackson, W. Kaka, J.M. McCrossin, A.M. Miller, R.J.T. Morris, and N.J. Pass, A Digital Library System for Periodicals Distribution, Proc. ADL'96, held at the Library of Congress, (May 1996). Reprinted IEEE Computer Society Press, Los Alamitos, Calif., pp. 95-103.
-
(1996)
Proc. ADL'96, Held at the Library of Congress
, pp. 95-103
-
-
Choy, D.M.1
Lotspiech, J.B.2
Anderson, L.C.3
Boyer, S.K.4
Dievendorff, R.5
Dwork, C.6
Griffin, T.D.7
Hoenig, B.A.8
Jackson, M.K.9
Kaka, W.10
McCrossin, J.M.11
Miller, A.M.12
Morris, R.J.T.13
Pass, N.J.14
-
6
-
-
84947907875
-
Technical Trials and Legal Tribulations
-
[Craver 1998]
-
[Craver 1998] S. Craver, B.-L. Yeo, and M. Yeung, Technical Trials and Legal Tribulations, Comm. ACM 41(7), 44-55, (1998).
-
(1998)
Comm. ACM
, vol.41
, Issue.7
, pp. 44-55
-
-
Craver, S.1
Yeo, B.-L.2
Yeung, M.3
-
8
-
-
0027206975
-
A Storage Subsystem for Image and Records Management
-
[Gladney 1993]
-
[Gladney 1993] H.M. Gladney, A Storage Subsystem for Image and Records Management, IBM Systems Journal 32(3), 512-540, (1993).
-
(1993)
IBM Systems Journal
, vol.32
, Issue.3
, pp. 512-540
-
-
Gladney, H.M.1
-
9
-
-
0031118725
-
Access Control for Large Collections
-
[Gladney 1997]
-
[Gladney 1997] H.M. Gladney, Access Control for Large Collections, ACM Trans. Info. Sys. 15(2), 154-194, (1997).
-
(1997)
ACM Trans. Info. Sys.
, vol.15
, Issue.2
, pp. 154-194
-
-
Gladney, H.M.1
-
11
-
-
0031650454
-
Access Control in an Open, Distributed Environment
-
[Hayton 1998] May
-
[Hayton 1998] R.J. Hayton, J.M. Bacon, and K. Moody, Access Control in an Open, Distributed Environment, Proc. IEEE Symposium on Security and Privacy, 3-14, (May 1998).
-
(1998)
Proc. IEEE Symposium on Security and Privacy
, pp. 3-14
-
-
Hayton, R.J.1
Bacon, J.M.2
Moody, K.3
-
12
-
-
3242758912
-
ImagePlus VisualInfo® General Information and Planning Guide
-
[IBM 1994]
-
[IBM 1994] IBM Corporation, ImagePlus VisualInfo® General Information and Planning Guide, IBM Systems Ref. Lib.GK2T-1709, (1994).
-
(1994)
IBM Systems Ref. Lib.GK2T-1709
-
-
-
14
-
-
3242802760
-
-
[IBM 1998]
-
[IBM 1998] IBM Corporation, IBM SecureWay Library, (1998).
-
(1998)
IBM SecureWay Library
-
-
-
15
-
-
18044384928
-
-
[ISO 1995] ISO/IEC JTC 1/SC 21/WG 1 N6947 Second CD 10181-3, May
-
[ISO 1995] International Organization for Standardization (ISO), Standard for Information Retrieval, Transfer and Management for OSI: Access Control Framework, ISO/IEC JTC 1/SC 21/WG 1 N6947 Second CD 10181-3, (May 1992); Information Technology -- Open Systems Interconnection -- Systems Management: Objects and Attributes for Access Control, ISO/IEC 10164-9, (Dec. 1995).
-
(1992)
Standard for Information Retrieval, Transfer and Management for OSI: Access Control Framework
-
-
-
17
-
-
84976834054
-
Authentication in Distributed Systems: Theory and Practice
-
[Lampson 1992]
-
[Lampson 1992] B. Lampson, M. Abadi, and M. Burrows, Authentication in Distributed Systems: Theory and Practice, ACM Trans. Computer Systems 10(4), 265-310, (1992).
-
(1992)
ACM Trans. Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson M, B.1
Abadi2
Burrows, M.3
-
18
-
-
3242797285
-
-
A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources
-
C. Lynch et al., A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources, (1998).
-
(1998)
-
-
Lynch, C.1
-
19
-
-
0031682432
-
Secure Execution of Java Applets using a Remote Playground
-
[Malkhi 1998] May
-
[Malkhi 1998] D. Malkhi, M.K. Reiter, and A.D. Rubin, Secure Execution of Java Applets using a Remote Playground, Proc. IEEE Symposium on Security and Privacy, 40-51, (May 1998).
-
(1998)
Proc. IEEE Symposium on Security and Privacy
, pp. 40-51
-
-
Malkhi, D.1
Reiter, M.K.2
Rubin, A.D.3
-
20
-
-
84947943261
-
Protecting Digital Media Content
-
[Memon 1998]
-
[Memon 1998] N. Memon and P.W. Wong, Protecting Digital Media Content, Comm. ACM 41(7), 34-43, (1998).
-
(1998)
Comm. ACM
, vol.41
, Issue.7
, pp. 34-43
-
-
Memon, N.1
Wong, P.W.2
-
21
-
-
0001891194
-
Opportunities for Watermarking Standards
-
[Mintzer 1998]
-
[Mintzer 1998] F. Mintzer, G.W. Braudaway, and A.E. Bell, Opportunities for Watermarking Standards, Comm. ACM 41(7), 56-65, (1998).
-
(1998)
Comm. ACM
, vol.41
, Issue.7
, pp. 56-65
-
-
Mintzer, F.1
Braudaway, G.W.2
Bell, A.E.3
-
25
-
-
0026119329
-
A Model of Authorization for Next-Generation Database Systems
-
[Rabitti 1991]
-
[Rabitti 1991] F. Rabitti, E. Bertino, W. Kim, and D. Woelk, A Model of Authorization for Next-Generation Database Systems, ACM Trans. Database Systems 16(1), 88-131, (1991).
-
(1991)
ACM Trans. Database Systems
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
26
-
-
3242796492
-
-
[Rosen 1970] Canadian Inst. of Chartered Accountants
-
[Rosen 1970] R.J. Rosen, R.J. Anderson, L.H. Chant, J.B. Dunlop, J.C. Gambles, and D.W. Rogers, Computer Audit Guidelines, Canadian Inst. of Chartered Accountants, (1970).
-
(1970)
Computer Audit Guidelines
-
-
Rosen, R.J.1
Anderson, R.J.2
Chant, L.H.3
Dunlop, J.B.4
Gambles, J.C.5
Rogers, D.W.6
-
27
-
-
84909662347
-
-
[Rosen 1998] Canadian Inst. of Chartered Accountants
-
[Rosen 1998] R.J. Rosen, R.J. Anderson, L.H. Chant, J.B. Dunlop, J.C. Gambles, D.W. Rogers, and J.H. Yates, Computer Control Guidelines, Canadian Inst. of Chartered Accountants, (1970).
-
(1970)
Computer Control Guidelines
-
-
Rosen, R.J.1
Anderson, R.J.2
Chant, L.H.3
Dunlop, J.B.4
Gambles, J.C.5
Rogers, D.W.6
Yates, J.H.7
-
29
-
-
0028726831
-
Policy Driven Management for Distributed Systems
-
[Sloman 1994]
-
Superceded by Information Technology Control Guidelines, 3rd Edition, (1998). Available via 〈http://www. cica.ca〉. [Sloman 1994] M. Sloman, Policy Driven Management for Distributed Systems, J. Network & Sys. Mgmt. 2(4), 333-360, (1994).
-
(1994)
J. Network & Sys. Mgmt.
, vol.2
, Issue.4
, pp. 333-360
-
-
Sloman, M.1
-
31
-
-
0032095654
-
Multimedia data-embedding and watermarking technologies
-
[Swanson 1998] June
-
[Swanson 1998] M. Swanson, M. Kobayashi, A. Tewfik, Multimedia data-embedding and watermarking technologies, Proceedings of the IEEE, 86(6), 1064-1087, (June 1998).
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.1
Kobayashi, M.2
Tewfik, A.3
-
33
-
-
0347468730
-
-
[Zhao 1998]
-
[Zhao 1998] J. Zhao, E. Koch, and C. Luo, In Business Today and Tomorrow, Comm. ACM 41(7), 66-73, (1998). The Safeguarding series:-
-
(1998)
In Business Today and Tomorrow, Comm. ACM
, vol.41
, Issue.7
, pp. 66-73
-
-
Zhao, J.1
Koch, E.2
Luo, C.3
-
34
-
-
0003225767
-
Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality
-
[Gladney 1997a] May
-
[Gladney 1997a] H.M. Gladney and J.B. Lotspiech, Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality, D-Lib Magazine, (May 1997).
-
(1997)
D-Lib Magazine
-
-
Gladney, H.M.1
Lotspiech, J.B.2
-
35
-
-
0041478931
-
Safeguarding Digital Library Contents and Users: Document Access Control
-
[Gladney 1997b] June
-
[Gladney 1997b] H.M. Gladney, Safeguarding Digital Library Contents and Users: Document Access Control, D-Lib Magazine, (June 1997).
-
(1997)
D-Lib Magazine
-
-
Gladney, H.M.1
-
36
-
-
0003225765
-
Safeguarding Digital Library Contents and Users: Digital Images of Treasured Antiquities
-
[Gladney 1997c] July
-
[Gladney 1997c] H.M. Gladney, F.C. Mintzer, and Fabio Schiattarella, Safeguarding Digital Library Contents and Users: Digital Images of Treasured Antiquities, D-LIB on-line magazine, (July 1997).
-
(1997)
D-LIB On-line Magazine
-
-
Gladney, H.M.1
Mintzer, F.C.2
Schiattarella, F.3
-
37
-
-
0009972768
-
Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels
-
[Lotspiech 1997] September
-
[Lotspiech 1997] J.B. Lotspiech, U. Kohl, and M.A. Kaplan, Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels, D-Lib Magazine, (September 1997).
-
(1997)
D-Lib Magazine
-
-
Lotspiech, J.B.1
Kohl, U.2
Kaplan, M.A.3
-
38
-
-
0013316594
-
Safeguarding Digital Library Contents and Users: Digital Watermarking
-
[Mintzer 1997] December
-
[Mintzer 1997] F. Mintzer, J. Lotspiech, and N. Morimoto, Safeguarding Digital Library Contents and Users: Digital Watermarking, DLIB on-line magazine, (December 1997).
-
(1997)
DLIB On-line Magazine
-
-
Mintzer, F.1
Lotspiech, J.2
Morimoto, N.3
-
39
-
-
3242765923
-
Charging for Online Content
-
[Herzberg 1998] January
-
[Herzberg 1998] A. Herzberg, Charging for Online Content, D-Lib Magazine, (January 1998).
-
(1998)
D-Lib Magazine
-
-
Herzberg, A.1
-
40
-
-
0041980099
-
The Internet Knowledge Manager: Dynamic Digital Libraries, and Agents You Can Understand
-
[Walker 1998] March A live demonstration version is accessible to anyone.
-
[Walker 1998] A. Walker, The Internet Knowledge Manager: Dynamic Digital Libraries, and Agents You Can Understand, D-Lib Magazine, (March 1998). A live demonstration version is accessible to anyone.
-
(1998)
D-Lib Magazine
-
-
Walker, A.1
-
41
-
-
3242780292
-
Safeguarding Copyrighted Contents: Digital Libraries and Intellectual Property Management
-
[Alrashid 1998] April
-
[Alrashid 1998] Tareq M. Alrashid, James A. Barker, Brian S. Christian, Steven C. Cox, Michael W. Rabne, Elizabeth A. Slotta, and Luella R. Upthegrove, Safeguarding Copyrighted Contents: Digital Libraries and Intellectual Property Management, D-Lib Magazine, (April 1998).
-
(1998)
D-Lib Magazine
-
-
Alrashid, T.M.1
Barker, J.A.2
Christian, B.S.3
Cox, S.C.4
Rabne, M.W.5
Slotta, E.A.6
Upthegrove, L.R.7
-
42
-
-
3242815538
-
Safeguarding Digital Library Contents and Users: A Note on Universal Unique Identifiers
-
[Gladney 1998a] April
-
[Gladney 1998a] H.M. Gladney, Safeguarding Digital Library Contents and Users: a Note on Universal Unique Identifiers, D-Lib Magazine, (April 1998).
-
(1998)
D-Lib Magazine
-
-
Gladney, H.M.1
-
43
-
-
3242779982
-
Safeguarding Digital Library Contents and Users: Storing, Sending, Showing, and Honoring Usage Terms and Conditions
-
[Gladney 1998b] May
-
[Gladney 1998b] H.M. Gladney and J.B. Lotspiech, Safeguarding Digital Library Contents and Users: Storing, Sending, Showing, and Honoring Usage Terms and Conditions, D-Lib Magazine, (May 1998).
-
(1998)
D-Lib Magazine
-
-
Gladney, H.M.1
Lotspiech, J.B.2
|