Last update: Sat Jan 6 02:03:49 MST 2018
@Article{OShea:1988:CDU,
author = "G. O'Shea",
title = "Controlling the dependency of user access control
mechanisms on correctness of user identification",
journal = j-COMP-J,
volume = "31",
number = "6",
pages = "503--509",
month = dec,
year = "1988",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/31.6.503",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:25 MST 2012",
bibsource = "Compendex database;
http://comjnl.oxfordjournals.org/content/31/6.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/",
URL = "http://comjnl.oxfordjournals.org/content/31/6/503.full.pdf+html;
http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/503.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/504.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/505.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/506.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/507.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/508.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/509.tif",
acknowledgement = ack-nhfb,
classcodes = "C6130 (Data handling techniques)",
classification = "723; C6130 (Data handling techniques)",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "Authentication Mechanisms; Biometric Authentication;
Cryptography; Data Structures; identity verification;
Identity verification, Data Processing; Password
Techniques; security of data; user access control; User
Access Control; User access control; user
identification; User Identification; User
identification; user identity; User identity",
thesaurus = "Security of data",
treatment = "P Practical",
}