메뉴 건너뛰기




Volumn 32, Issue 9, 1994, Pages 40-48

Access Control: Principles and Practice

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; COMPUTER SIMULATION; DATA HANDLING; DATABASE SYSTEMS;

EID: 0028513932     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/35.312842     Document Type: Article
Times cited : (961)

References (10)
  • 1
    • 0343050450 scopus 로고    scopus 로고
    • Using Kerberos for Authentication on Computer Networks
    • in this issue
    • B. C. Neuman “Using Kerberos for Authentication on Computer Networks,” IEEE Commun Mag, in this issue.
    • IEEE Commun Mag
    • Neuman, B.C.1
  • 2
    • 0026630927 scopus 로고
    • Authentication for Distributed Systems
    • T. Y. c. Woo and S. S. Lam. “Authentication for Distributed Systems.” IEEE Computer, vol. 25, no. “ pps. 39–52. Jan. 1992.
    • (1992) IEEE Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T.Y.C.1    Lam, S.S.2
  • 4
    • 0004190705 scopus 로고
    • Database Security (Addison Wesley
    • S. Castano et al., Database Security (Addison Wesley. 1994).
    • (1994)
    • Castano, S.1
  • 5
    • 84938454021 scopus 로고
    • On Five Definitions of Integrity Data
    • and (” in T. Keefe and C. E. Landwehr, eds., North-Holland
    • R. S. Sandhu, “On Five Definitions of Data Integrity,” In T. Keefe and C. E. Landwehr, eds. Database Security VII: Status and Prospects, (North-Holland 1994)
    • (1994) Database Security VII: Status Prospects
    • Sandhu, R.S.1
  • 6
    • 0027699087 scopus 로고
    • Lattice-Based Access Control Models
    • R: S. Sandhu, “Lattice-Based Access Control Models, IEEE Computer, vol. 26, no. 11, pps. 9–19, Nov. 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R:S.1
  • 7
    • 0011588485 scopus 로고
    • Trusted Products Evaluation
    • S. Chokani, “Trusted Products Evaluation,” Commun. of the ACM, vol. 35. no. 7 pps. 64–76. July 1992.
    • (1992) Commun. of the ACM , vol.35 , Issue.7 , pp. 64-76
    • Chokani, S.1
  • 9
    • 77949690129 scopus 로고
    • Role-Based Access Control: A Multi-Dimensional View
    • R. S. Sandhu et al., “Role-Based Access Control: A Multi-Dimensional View.” submitted for publication. 1994.
    • (1994)
    • Sandhu, R.S.1
  • 10
    • 0000985630 scopus 로고
    • An Examination of Federal and Commercial Access Control Policy Needs
    • pps. Baltimore, MD
    • D. F. Ferraiolo. D. M. Gilbert, and N.Lynch. “An Examination of Federal and Commercial Access Control Policy Needs,” 6th NIST-NCSC National Computer Security Conf., pps. 107–116, Baltimore, MD, Sep. 20–23 1993.
    • (1993) 6th NIST-NCSC National Computer Security Conf. , pp. 107-116
    • Ferraiolo, D.F.1    Gilbert, D.M.2    Lynch, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.