Authentifizierungsverstärkung auf Ressourcenniveau

[1]  Rae K. Burns Referential secrecy , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Simon R. Wiseman,et al.  Providing security in a phone book database using triggers , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.