Authentication and discretionary access control in computer networks
- 31 December 1986
- journal article
- Published by Elsevier in Computers & Security
- Vol. 5 (4) , 314-324
- https://doi.org/10.1016/0167-4048(86)90052-0
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Object representation on a heterogeneous networkACM SIGOPS Operating Systems Review, 1982
- Formal Models for Computer SecurityACM Computing Surveys, 1981
- Encryption and Secure Computer NetworksACM Computing Surveys, 1979
- The use of passwords for controlled access to computer resourcesPublished by National Institute of Standards and Technology (NIST) ,1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- EthernetCommunications of the ACM, 1976
- A comment on the confinement problemACM SIGOPS Operating Systems Review, 1975
- The protection of information in computer systemsProceedings of the IEEE, 1975
- Protection and the control of information sharing in multicsCommunications of the ACM, 1974