Authentication mechanisms in microprocessor-based local area networks

L Ciminiera, A Valenzano - IEEE transactions on software …, 1989 - ieeexplore.ieee.org
The problem of authenticating the users of a computer network in order to protect the shared
resources against unauthorized use is discussed. Since intruders could enter the network …

[图书][B] Concurrent checkpointing for fast recovery in object-based systems

JE DeGroat - 1991 - search.proquest.com
Traditional checkpoint and recovery are based upon two basic assumptions. The first is the
need to halt the computation in progress to save the state of the computation, ie, take the …