Authentication and discretionary access control in computer networks
暂无分享,去创建一个
[1] E. J. Feinler,et al. ARPANET protocol handbook , 1976 .
[2] Robert H. Thomas,et al. A resource sharing executive for the ARPANET , 1973, AFIPS National Computer Conference.
[3] C. Gray Girling. Object representation on a heterogeneous network , 1982, OPSR.
[4] Elliott I. Organick,et al. The multics system: an examination of its structure , 1972 .
[5] Robert Metcalfe,et al. Ethernet: distributed packet switching for local computer networks , 1976, CACM.
[6] Paul A. Karger,et al. Security in Automatic Data Processing (ADP) Network Systems. , 1976 .
[7] Steven B. Lipner,et al. A comment on the confinement problem , 1975, SOSP.
[8] Maurice V. Wilkes,et al. Time-sharing computer systems , 1968 .
[9] Helen Marie Wood,et al. The use of passwords for controlled access to computer resources. , 1977 .
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Gerald J. Popek,et al. Encryption and Secure Computer Networks , 1979, CSUR.
[12] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[13] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[14] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[15] P. A. Karger. NON-DISCRETIONARY ACCESS CONTROL FOR DECENTRALIZED COMPUTING SYSTEMS , 1977 .