Controlling the Access Requests in an Information Protection System
暂无分享,去创建一个
[1] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[2] Chin-Chen Chang,et al. A key-lock-pair mechanism based on generalized chinese remainder theorem , 1986 .
[3] Chin-Chen Chang,et al. An access control scheme for new users and files , 1988 .
[4] Carl K. Chang,et al. A Binary Single-Key-Lock System for Access Control , 1989, IEEE Trans. Computers.
[5] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[6] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[7] Tai-Yang Hwang,et al. Access Control with Single-Key-Lock , 1984, IEEE Transactions on Software Engineering.
[8] Chi-Sung Laih,et al. On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial , 1989, IEEE Trans. Software Eng..
[9] Chin-Chen Chang,et al. On the design of a Key-Lock-Pair mechanism in information protection systems , 1986, BIT.
[10] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).