nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstracts of recent articles and literature
|
|
|
1991 |
10 |
7 |
p. 675-682 8 p. |
artikel |
2 |
Access control in distributed heterogeneous database management systems
|
Goyal, M.L. |
|
1991 |
10 |
7 |
p. 661-669 9 p. |
artikel |
3 |
A computerized management reporting aid for a mainframe security system
|
Pottas, D. |
|
1991 |
10 |
7 |
p. 653-660 8 p. |
artikel |
4 |
Algorithm- sequenced access control
|
Domingo-Ferrer, Joseph |
|
1991 |
10 |
7 |
p. 639-652 14 p. |
artikel |
5 |
Calendar
|
|
|
1991 |
10 |
7 |
p. 683-684 2 p. |
artikel |
6 |
Computer verification of human users' identity: A theoretical model and some evaluation criteria
|
Fåk, Viiveke |
|
1991 |
10 |
7 |
p. 626-636 11 p. |
artikel |
7 |
Design aspects of access control in a knowledge base system
|
Steinke, Gerhard |
|
1991 |
10 |
7 |
p. 612-625 14 p. |
artikel |
8 |
Editor's note
|
|
|
1991 |
10 |
7 |
p. 611- 1 p. |
artikel |
9 |
European unification '92 impacts on information security
|
Sherizen, Sanford |
|
1991 |
10 |
7 |
p. 601-610 10 p. |
artikel |
10 |
From the editor
|
|
|
1991 |
10 |
7 |
p. 584-585 2 p. |
artikel |
11 |
Guide for authors
|
|
|
1991 |
10 |
7 |
p. 685- 1 p. |
artikel |
12 |
IFIP technical committee 11
|
|
|
1991 |
10 |
7 |
p. 671-672 2 p. |
artikel |
13 |
IFIP/WG 11.1
|
|
|
1991 |
10 |
7 |
p. 673-674 2 p. |
artikel |
14 |
Random bits & bytes
|
Highland, HaroldJoseph |
|
1991 |
10 |
7 |
p. 586-600 15 p. |
artikel |
15 |
Refereed articles
|
|
|
1991 |
10 |
7 |
p. 637- 1 p. |
artikel |