메뉴 건너뛰기




Volumn , Issue , 2003, Pages

Access Control based on Execution History

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER SOFTWARE; HIGH LEVEL LANGUAGES; NETWORK SECURITY; WEB SERVICES;

EID: 84890865854     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (154)

References (21)
  • 10
    • 0024089972 scopus 로고
    • The confused deputy
    • Oct
    • N. Hardy. The confused deputy. ACM Operating Systems Review, 22(4):36–38, Oct. 1988. Available from http://www.cis.upenn.edu/~KeyKOS/ConfusedDeputy.html.
    • (1988) ACM Operating Systems Review , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 16
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in multics
    • July
    • J. H. Saltzer. Protection and the control of information sharing in multics. Communications of the ACM, 17(7), July 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7
    • Saltzer, J. H.1
  • 18
    • 0015315880 scopus 로고
    • A hardware architecture for implementing protection rings
    • M. D. Schroeder and J. H. Saltzer. A hardware architecture for implementing protection rings. Communications of the ACM, 15(3):157– 170, 1972.
    • (1972) Communications of the ACM , vol.15 , Issue.3 , pp. 157-170
    • Schroeder, M. D.1    Saltzer, J. H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.