Main View
This view is used for searching all possible sources.
First Page Previous Page 1 Next Page Last Page
 
1
Computer Program Development Specification Transmission ...
1980-02-08

... Accession Number : ADA081756. Title : Computer Program Development Specification Transmission Control Program (TCP). Revision 3. ...

DTIC Science & Technology

2
Computer Program Development Specification Terminal ...
1979-04-06

... Title : Computer Program Development Specification Terminal Access Controller. Appendix B. Access Line Modes. Descriptive Note : Final rept.,. ...

DTIC Science & Technology

3
DARPA Internet Program. Internet and Transmission Control ...
1981-09-01

... Accession Number : ADA111091. Title : DARPA Internet Program. Internet and Transmission Control Specifications,. Corporate ...

DTIC Science & Technology

4
Analysis of Access Violations on Controlled Access Facilities.
1965-01-01

This study gathers information on 986 access control violations on approximately 770 miles of freeway open to traffic in Texas. Three specific objectives were studied: to catalog the types of access violations, to determine their extent and causes, and to...

National Technical Information Service (NTIS)

5
Discretionary Security for Object-Oriented Database Systems.
1991-01-01

The discretionary access controls in today's computer systems are designed to enforce a specific access control policy. An application whose access control policies do not easily match the policy that is wired into the system is forced to work around ...

National Technical Information Service (NTIS)

6
Aquatic Plant Control Research Program: Host Specificity of ...
1990-06-01

... Accession Number : ADA225025. Title : Aquatic Plant Control Research Program: Host Specificity of Microbial Flora from Eurasian Watermilfoil. ...

DTIC Science & Technology

7
Traffic-Adaptive, Flow-Specific Medium Access for Wireless ...
2009-09-01

... The novel traffic-adaptive Cooperative Wireless Sensor Network Medium Access Control (CWS-MAC) scheme is proposed and shown to provide ...

DTIC Science & Technology

8
Design Guidelines and Functional Specifications for ...
1988-07-01

... Activation of these keys provides the user access to a series of ... and map-based battlefield data central to command and control; a radio interface for ...

DTIC Science & Technology

9
Flexible Control of Downloaded Executable Content
1997-01-01

this paper, we define an access control model with the following properties: (1) system administrators can define system access control requirements on applications and (2) application developers can use the same architecture to enforce application access control ...

E-print Network

10
Automated En Route Air Traffic Control Algorithmic ...
1983-09-01

... Accession Number : ADA136796. Title : Automated En Route Air Traffic Control Algorithmic Specifications. Volume 4. Sector Workload Probe. ...

DTIC Science & Technology

11
TAC Functional Specification.
1980-01-01

The Terminal Access Controller (TAC) is a terminal controller for the ARPANET. The present document describes what the TAC does, what it does not do, and what its relationship is to the network. (Author)

National Technical Information Service (NTIS)

12
Secure Access Control with High Access Precision.
1988-03-01

... Accession Number : ADA194684. Title : Secure Access Control with High Access Precision. ... This is a problem in access precision. ...

DTIC Science & Technology

13
Efficient Access Control in Multimedia Social Networks
2011-01-01

Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, ...

NASA Astrophysics Data System (ADS)

14
A Service Access Security Control Model in Cyberspace
2011-01-01

A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to ...

NASA Astrophysics Data System (ADS)

15
Access Control in Extensible Systems
1997-01-01

The recent trend towards dynamically extensible systems holds the promise of more powerful and flexible systems. At the same time, the impact of extensibility on overall system security and, specifically, access control is still ill understood, and protection mechanisms in these extensible systems are rudimentary at best. In this ...

E-print Network

First Page Previous Page 1 Next Page Last Page