-
1
-
-
85024545223
-
-
B, Fraser (editor), RFC 2196, Site Security Handbook, September 1997.
-
(1997)
-
-
Fraser, B.1
-
2
-
-
0035269708
-
Non technical Hurdles to Implementing Effective Security Policies
-
Kessler G C, Non technical Hurdles to Implementing Effective Security Policies, IT Professional, March/April 2001, p 49, 2001.
-
(2001)
IT Professional
, pp. 49
-
-
Kessler, G.C.1
-
3
-
-
23844516018
-
Securing SS7 Telecommunications Networks
-
United States Military Academy
-
Lorenz G, Moore T, Manes G, Hale J, & Shenoi S, Securing SS7 Telecommunications Networks, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, p 273, June 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
, pp. 273
-
-
Lorenz, G.1
Moore, T.2
Manes, G.3
Hale, J.4
Shenoi, S.5
-
4
-
-
85024537643
-
-
Competitive Analysis of Secure Remote Password:http://srp.Stanford, edu/analysis.html
-
-
-
-
7
-
-
85024537065
-
-
Short Message Peer to Peer Protocol Specification v3.4; SMPP Developers Forum, October 1999.
-
(1999)
SMPP Developers Forum
-
-
-
8
-
-
85024532602
-
The International Public Telecommunication Number Plan
-
ITU-T, The International Public Telecommunication Number Plan, Recommendation E.164, May 1997.
-
(1997)
Recommendation
-
-
-
9
-
-
33646514226
-
Technical Specification, Digital cellular telecommunications system (Phase 2+
-
GSM 09.02 (ETSI TS 100 974):Technical Specification, Digital cellular telecommunications system (Phase 2+); Mobile Application Part (MAP) specification.
-
Mobile Application Part (MAP) specification.
-
-
-
11
-
-
0030086382
-
Role-based Access Control Models
-
Sandhu R S, Coyne E J, Feinstein H L, & Youman C E, Role-based Access Control Models, IEEE Computer, p 38, February 1996.
-
(1996)
IEEE Computer
, pp. 38
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
84992227458
-
Proposed NIST Standard for Role-based Access Control
-
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, & Chandramouli R, Proposed NIST Standard for Role-based Access Control, ACM Transactions on Information and System Security, p 224, August 2001.
-
(2001)
ACM Transactions on Information and System Security
, pp. 224
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
14
-
-
4143096907
-
Spatial Role-Based Access Control Model for Wireless Networks, Vehicular Technology Conference, VTC 2003-Fall, 2003
-
Hansen F, Oleshchuk V, Spatial Role-Based Access Control Model for Wireless Networks, Vehicular Technology Conference, VTC 2003-Fall, 2003 IEEE 58th, vol 3, p 2093, October 2003.
-
(2003)
IEEE 58th
, vol.3
, pp. 2093
-
-
Hansen, F.1
Oleshchuk, V.2
-
16
-
-
0033322125
-
Java Card—From Hype to Reality
-
Baentsch M, Buhler P, Eirich T, Horing F, & Oestreicher M, Java Card—From Hype to Reality, IEEE Concurrency, October-December 1999.
-
(1999)
IEEE Concurrency
-
-
Baentsch, M.1
Buhler, P.2
Eirich, T.3
Horing, F.4
Oestreicher, M.5
-
20
-
-
85024547129
-
-
The President's National Security Telecommunications Advisory Committee—Wireless Task Force Report, Wireless Priority Service, August 2002.
-
(2002)
Wireless Priority Service
-
-
|