Last update: Sat Jan 6 02:03:49 MST 2018
@Article{OShea:1988:CDU, author = "G. O'Shea", title = "Controlling the dependency of user access control mechanisms on correctness of user identification", journal = j-COMP-J, volume = "31", number = "6", pages = "503--509", month = dec, year = "1988", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/31.6.503", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Tue Dec 4 14:48:25 MST 2012", bibsource = "Compendex database; http://comjnl.oxfordjournals.org/content/31/6.toc; http://www.math.utah.edu/pub/tex/bib/compj1980.bib; http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/", URL = "http://comjnl.oxfordjournals.org/content/31/6/503.full.pdf+html; http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/503.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/504.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/505.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/506.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/507.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/508.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_31/Issue_06/tiff/509.tif", acknowledgement = ack-nhfb, classcodes = "C6130 (Data handling techniques)", classification = "723; C6130 (Data handling techniques)", fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", keywords = "Authentication Mechanisms; Biometric Authentication; Cryptography; Data Structures; identity verification; Identity verification, Data Processing; Password Techniques; security of data; user access control; User Access Control; User access control; user identification; User Identification; User identification; user identity; User identity", thesaurus = "Security of data", treatment = "P Practical", }