Access Control Systems with User Authentication
碩士 === 東吳大學 === 資訊科學系 === 91 === It is necessary to appropriately manage the computer system resources that are only accessed by the authorized users. The servers use the user’s identifier and password for user authentication, and achieve the purpose of access control. The computer system...
Main Authors: | Chen, Chern-Muh, 陳春木 |
---|---|
Other Authors: | He, Wei-Hua |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/83409934126622114655 |
Similar Items
-
A Study of Integrated Access Control with User Authentication
by: Yi-Kang Ho, et al.
Published: (2005) -
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
by: Ho-Kyung Yang, et al.
Published: (2014-02-01) -
On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems
by: Santanu Chatterjee, et al.
Published: (2017-01-01) -
Authentication and Access: Accommodating Public Users in an Academic World
by: Lynne Weber, et al.
Published: (2010-09-01) -
INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL
by: BRUNO OLIVEIRA SILVESTRE
Published: (2005)