Entry OShea:1988:CDU from compj1980.bib

Last update: Sat Jan 6 02:03:49 MST 2018                Valid HTML 3.2!

Index sections

Top | Symbols | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{OShea:1988:CDU,
  author =       "G. O'Shea",
  title =        "Controlling the dependency of user access control
                 mechanisms on correctness of user identification",
  journal =      j-COMP-J,
  volume =       "31",
  number =       "6",
  pages =        "503--509",
  month =        dec,
  year =         "1988",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/31.6.503",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Dec 4 14:48:25 MST 2012",
  bibsource =    "Compendex database;
                 http://comjnl.oxfordjournals.org/content/31/6.toc;
                 http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/",
  URL =          "http://comjnl.oxfordjournals.org/content/31/6/503.full.pdf+html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/503.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/504.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/505.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/506.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/507.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/508.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/509.tif",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  classification = "723; C6130 (Data handling techniques)",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "Authentication Mechanisms; Biometric Authentication;
                 Cryptography; Data Structures; identity verification;
                 Identity verification, Data Processing; Password
                 Techniques; security of data; user access control; User
                 Access Control; User access control; user
                 identification; User Identification; User
                 identification; user identity; User identity",
  thesaurus =    "Security of data",
  treatment =    "P Practical",
}

Related entries