[go: up one dir, main page]

Lampson, 2007 - Google Patents

Practical principles for computer security

Lampson, 2007

View DOC
Document ID
12708984413363326043
Author
Lampson B
Publication year
Publication venue
NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION SECURITY

External Links

Snippet

Most real world systems are not very secure by the absolute standard suggested above. It's easy to break into someone's house. In fact, in many places people don't even bother to lock their houses, although in Manhattan they may use two or three locks on the front door. It's …
Continue reading at www.microsoft.com (DOC) (other versions)

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B65/00Locks or fastenings for special use
    • E05B65/0075Locks or fastenings for special use for safes, strongrooms, vaults, fire-resisting cabinets or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/06Safes or strong-rooms for valuables having provision for multiple compartments
    • E05G1/08Safes or strong-rooms for valuables having provision for multiple compartments secured individually
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • E05B67/36Padlocks with closing means other than shackles; Removable locks, the lock body itself being the locking element; Padlocks consisting of two separable halves or cooperating with a stud
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • E05B67/06Shackles; Arrangement of the shackle
    • E05B67/08Padlocks with shackles hinged on the case
    • E05B67/18Padlocks with shackles hinged on the case with devices for securing both ends of the shackle

Similar Documents

Publication Publication Date Title
Ali et al. xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things
US20240364532A1 (en) Trust and identity management systems and methods
JP3640338B2 (en) Secure electronic data storage and retrieval system and method
Humphrey et al. Security for grids
Birrell et al. Federated identity management systems: A privacy-based characterization
Dramé-Maigné et al. Centralized, distributed, and everything in between: Reviewing access control solutions for the IoT
Ghaffari et al. Authentication and access control based on distributed ledger technology: A survey
JP2001229078A (en) Authorization infrastructure based on public key cryptography
US7827407B2 (en) Scoped federations
JP2009514072A (en) Method for providing secure access to computer resources
Khattak et al. A study on threat model for federated identities in federated identity management system
Bhatti et al. An integrated approach to federated identity and privilege management in open systems
Mavridis et al. Access control based on attribute certificates for medical intranet applications
Linklater et al. Toward distributed key management for offline authentication
Karp et al. Solving the transitive access problem for the services oriented architecture
De Clercq et al. Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
Lampson Practical principles for computer security
Perrin et al. Delegated cryptography, online trusted third parties, and PKI
Raghunathan et al. Secure agent computation: X. 509 Proxy Certificates in a multi-lingual agent framework
Jesudoss et al. Enhanced certificate-based authentication for distributed environment
Lock et al. Grid Security and its use of X. 509 Certificates
Gkotsis Creating a windows active directory lab and performing simulated attacks
CN114996770B (en) Identity recognition method based on sink management system
Andersen Decentralized authorization with private delegation
Haidar et al. Critical evaluation of current approaches to grid security