Lampson, 2007 - Google Patents
Practical principles for computer securityLampson, 2007
View DOC- Document ID
- 12708984413363326043
- Author
- Lampson B
- Publication year
- Publication venue
- NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION SECURITY
External Links
Snippet
Most real world systems are not very secure by the absolute standard suggested above. It's easy to break into someone's house. In fact, in many places people don't even bother to lock their houses, although in Manhattan they may use two or three locks on the front door. It's …
- 241001391944 Commicarpus scandens 0 abstract description 2
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B65/00—Locks or fastenings for special use
- E05B65/0075—Locks or fastenings for special use for safes, strongrooms, vaults, fire-resisting cabinets or the like
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05G—SAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
- E05G1/00—Safes or strong-rooms for valuables
- E05G1/06—Safes or strong-rooms for valuables having provision for multiple compartments
- E05G1/08—Safes or strong-rooms for valuables having provision for multiple compartments secured individually
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B67/00—Padlocks; Details thereof
- E05B67/36—Padlocks with closing means other than shackles; Removable locks, the lock body itself being the locking element; Padlocks consisting of two separable halves or cooperating with a stud
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B67/00—Padlocks; Details thereof
- E05B67/06—Shackles; Arrangement of the shackle
- E05B67/08—Padlocks with shackles hinged on the case
- E05B67/18—Padlocks with shackles hinged on the case with devices for securing both ends of the shackle
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ali et al. | xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things | |
US20240364532A1 (en) | Trust and identity management systems and methods | |
JP3640338B2 (en) | Secure electronic data storage and retrieval system and method | |
Humphrey et al. | Security for grids | |
Birrell et al. | Federated identity management systems: A privacy-based characterization | |
Dramé-Maigné et al. | Centralized, distributed, and everything in between: Reviewing access control solutions for the IoT | |
Ghaffari et al. | Authentication and access control based on distributed ledger technology: A survey | |
JP2001229078A (en) | Authorization infrastructure based on public key cryptography | |
US7827407B2 (en) | Scoped federations | |
JP2009514072A (en) | Method for providing secure access to computer resources | |
Khattak et al. | A study on threat model for federated identities in federated identity management system | |
Bhatti et al. | An integrated approach to federated identity and privilege management in open systems | |
Mavridis et al. | Access control based on attribute certificates for medical intranet applications | |
Linklater et al. | Toward distributed key management for offline authentication | |
Karp et al. | Solving the transitive access problem for the services oriented architecture | |
De Clercq et al. | Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2 | |
Lampson | Practical principles for computer security | |
Perrin et al. | Delegated cryptography, online trusted third parties, and PKI | |
Raghunathan et al. | Secure agent computation: X. 509 Proxy Certificates in a multi-lingual agent framework | |
Jesudoss et al. | Enhanced certificate-based authentication for distributed environment | |
Lock et al. | Grid Security and its use of X. 509 Certificates | |
Gkotsis | Creating a windows active directory lab and performing simulated attacks | |
CN114996770B (en) | Identity recognition method based on sink management system | |
Andersen | Decentralized authorization with private delegation | |
Haidar et al. | Critical evaluation of current approaches to grid security |