Last update: Fri Jan 5 02:05:58 MST 2018
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Karger:1985:ADA,
author = "Paul A. Karger",
title = "Authentication and Discretionary Access Control in
Computer Networks",
journal = j-COMP-NET-ISDN,
volume = "10",
number = "1",
pages = "27--37",
month = aug,
year = "1985",
CODEN = "CNISE9",
ISSN = "0169-7552 (print), 1879-2324 (electronic)",
ISSN-L = "0169-7552",
bibdate = "Sat Sep 25 23:08:50 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/compnetisdn.bib",
acknowledgement = ack-nhfb,
affiliation = "Digital Equipment Corp, Littleton, MA, USA",
classification = "723",
journal-URL = "http://www.sciencedirect.com/science/journal/01697552",
journalabr = "Comput Networks ISDN Syst",
keywords = "access control; authentication; computer networks;
data processing --- Security of Data; data security;
digital network architecture; network security",
}
Related entries
- architecture,
9(3)201,
9(4)257,
10(3)157,
10(3)211,
11(z)277,
13(2)75,
14(2)297,
16(1)138,
17(2)111,
18(1)55,
19(z)201,
21(3)149,
22(2)155,
23(1)125,
24(2)171,
24(4)311,
25(4)405,
25(6)599,
25(10)1089,
25(10)1127,
26(1)61,
26(3)337,
26(6)817,
26(9)1187,
26(11)1343,
27(2)289,
27(3)353,
27(3)471,
27(6)729,
27(6)919,
27(12)1567,
28(1)239,
28(4)429,
28(5)613,
28(6)835,
28(7)941,
28(7)1027,
28(7)1243,
28(7)1385,
29(2)137,
29(4)393,
29(4)397,
29(4)437,
29(4)473,
29(7)735,
29(8)1507,
30(1)43,
30(1)205,
30(1)763,
30(16)1571,
30(22)2081,
30(22)2141,
30(22)2169
- authentication,
14(2)389,
17(4)315,
25(4)483,
27(6)1047,
30(16)1511
- processing,
11(1)15,
11(3)219,
12(4)209,
12(4)225,
13(3)235,
14(2)167,
14(2)373,
15(1)67,
15(4)229,
16(1)21,
16(1)138,
20(1)137,
21(3)149,
23(1)195,
25(4)454,
26(z)z-1,
27(2)135,
27(2)193,
27(2)205,
27(2)215,
27(3)353,
27(6)823,
27(6)831,
27(6)841,
27(6)1009,
27(8)1211,
27(8)1215,
27(8)1231,
27(8)1247,
27(8)1263,
27(8)1287,
28(7)1027,
28(7)1149,
28(7)1291,
29(4)473,
29(14)1705,
30(1)616,
30(20)2015
- security,
13(3)235,
14(2)389,
15(1)67,
17(4)315,
19(z)201,
22(5)323,
25(4)469,
25(4)476,
25(4)483,
25(4)490,
26(3)263,
26(11)1343,
27(2)289,
28(4)499,
29(8)927,
29(15)1799,
30(16)1597