메뉴 건너뛰기




Volumn 15, Issue 1-2, 1997, Pages 58-71

Using Bluestem for Web user authentication and access control of library resources

Author keywords

Access control; Illinois University; Libraries; Software use

Indexed keywords


EID: 84886393277     PISSN: 07378831     EISSN: None     Source Type: Journal    
DOI: 10.1108/07378839710307296     Document Type: Article
Times cited : (3)

References (10)
  • 1
    • 84886402843 scopus 로고
    • Librarians Address Woes of Network Implementation & Management [Summary of Fall Task Force Meeting of the Coalition for Network Information]
    • Michael Rogers, “Librarians Address Woes of Network Implementation & Management [Summary of Fall Task Force Meeting of the Coalition for Network Information],” Library Journal 120:3 (1995): 115.
    • (1995) Library Journal , vol.120 , Issue.3 , pp. 115
    • Rogers, M.1
  • 2
    • 84993047925 scopus 로고    scopus 로고
    • Security Alert
    • Michael Schuyler, “Security Alert,” Computers in Libraries 16:6 (1996): 40-43.
    • (1996) Computers in Libraries , vol.16 , Issue.6 , pp. 40-43
    • Schuyler, M.1
  • 3
    • 84993081089 scopus 로고
    • Safety Net [Brief Reviews of 6 Books on Network Security]
    • Edward J. Valauskas, “Safety Net [Brief Reviews of 6 Books on Network Security],” Library Journal 120:13 (1995): 109.
    • (1995) Library Journal , vol.120 , Issue.13 , pp. 109
    • Valauskas, E.J.1
  • 4
    • 0039719172 scopus 로고    scopus 로고
    • Web Security: How Much Is Enough?
    • Vance McCarthy, “Web Security: How Much Is Enough?,” Datamation 43:5 (1997): 112-117.
    • (1997) Datamation , vol.43 , Issue.5 , pp. 112-117
    • McCarthy, V.1
  • 6
    • 0040528600 scopus 로고
    • Distributed and Secure
    • [includes sidebar: “How the Kerberos Protocol Works”]
    • Russell Kay, “Distributed and Secure” [includes sidebar: “How the Kerberos Protocol Works”], Byte 19:6 (1994): 165-166.
    • (1994) Byte , vol.19 , Issue.6 , pp. 165-166
    • Kay, R.1
  • 7
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • B. Clifford Neuman and Theodore Ts'o, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications Magazine 32:9 (1994): 33-38.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 8
    • 84992956595 scopus 로고    scopus 로고
    • Kaufman, et al., 265-326.
    • Kaufman1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.