Security technologies for intranet computing
Ashley, Paul (1999) Security technologies for intranet computing. .
Impact and interest:
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||QUT Thesis (PhD)|
|Additional Information:||Presented to the Information Security Research Centre, School of Data Communications, Queensland University of Technology.|
|Keywords:||Computers Access control, Intranets (Computer networks Security measures, TCP/IP (Computer network protocol), authentication, access control, aauthorisation, Generic Security Services Application Program Interface (GSS-API), intranet, intranet security, networking, network security, Role Based Access Control (RBAC), security architectures, Secure European System for Applications Vendor Environment (SESAME), smart cards, Secure Sockets Layer (SSL), Transmission Control Protocol/Internet Protocol (TCI/IP), Transport Layer Security (TLS), World Wide Web (WWW), thesis, doctoral|
|Institution:||Queensland University of Technology|
|Copyright Owner:||Copyright Paul Ashley|
|Deposited On:||22 Sep 2010 23:06|
|Last Modified:||09 Feb 2011 23:55|
Repository Staff Only: item control page