Making Login Services Independent of Authentication Technologies, Vipin Samar, Charlie Lai, SunSoft Inc.; Conference on Computer and Communications Security, Mar. 1996.* |
Application of a Multilevel Access Model in the Development of a Security Infrastructure for a Clinical Information System, 1994 AMIA, Inc.* |
Davis, R: “Network Authentication Tokens” Computer Security Applications Conference 1989 Fifth Annual Tucson AZ, Dec. 4-8, 1998 Los Alamitos, CA USA, IEEE Comput. Soc. US Page(s) 234-238 XP010017880, ISBN: 0-8186-2006-4, p. 236, right-hand column., line 19, paragraphs ACCESS control p. 237 right-hand column, line 2, p. 234, left-hand column line 44, paragraph AUTHENTICATION p. 235, right-hand column, line 26. |
Samar, V: Unified Login with Pluggable Authentication Modules (PAM), 3rd ACM Conference on Computer and Communications Security, Proceedings of 3rd ACM Conference on Computer and Communications Security, New Delhi, India, Mar. 14-16, 1996, New York, NY, USA , AM, USA Page(s) 1-10 XP000620972 ISBN: 0-89791-829-0, p. 42, left-hand column, line 11, paragraphs Configuration Management, p. 5 right-hand column line 31, p. 5, right-hand column line 39-, p. 5, right-hand column, line 42, p. 6, right-hand column, line 1 p. 6, right-hand column line 7. |