ProceedingsIEEE Computer Society Press, 1998 - Computers |
From inside the book
Try this search over all volumes: copying phase
Results 1-0 of 0
Contents
Access Control in an Open Distributed Environment | 3 |
Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE | 15 |
Composing PartiallySpecified Systems | 27 |
Copyright | |
17 other sections not shown
Other editions - View all
Common terms and phrases
access control algorithm allow analysis applet application approach assume attack authentication biometric bits browser buffer overflow certificate client component Computer constraints covert channels credential record cryptographic database decryption defined described digital signature domain encryption environment example execution fair exchange fault injection function graphics server hash hash function IEEE implementation input Java label mobile agent mobile code module node off-line operations OpSet packet filter password playground principal hierarchy private key proof protocol proxy ps-reads ps-writes public key queue random RBAC RBAC system reader real-time requirements role RoleSet router Section Security and Privacy security levels security policy security violations semantic security signature scheme specification stack frame stack inspection static strand space subnetwork system_t telnet term(n Theorem tion transactions Trojan horse types UNIX user's valid verifier vulnerability WATCHERS