CCS
14 years 1 months ago
1994 ACM
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
CCS
14 years 1 months ago
1994 ACM
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
CCS
14 years 1 months ago
1994 ACM CCS
14 years 1 months ago
1994 ACM
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
CCS
14 years 1 months ago
1994 ACM
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
|