within the distributed environment. These access control rules and network protection rules are also held by the accompanying security agent. Protection is therefore transparent to the user, because the agents travel with the access requests and resultant information, and protects it on its path as
โฆ LIBER โฆ
An Internet accessible telepresence
โ Scribed by A.E. Kaplan; S. Keshav; N.L. Schryer; J.H. Venutolo
- Publisher
- Springer US
- Year
- 1997
- Tongue
- English
- Weight
- 291 KB
- Volume
- 5
- Category
- Article
- ISSN
- 0942-4962
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Controlling internet access at an educat
๐
Article
๐
1997
๐
Elsevier Science
๐
English
โ 112 KB
TelePresence
โ
Burstein, Michael A
๐
Fiction
๐
0
๐
English
โ 72 KB
TelePresence
โ
Burstein, Michael A
๐
Fiction
๐
English
โ 30 KB
Making internet access safe
โ
Helen Meyer
๐
Article
๐
1996
๐
Elsevier Science
๐
English
โ 131 KB
guarded against would-be attackersAt a minimum,each time they logon, all PC users should be required to type in passwords that only they and the network administrator know These should not be easy to guess and should be changed every few weeks. The system should lock out anyone who fails to type in
Telepresence surgery
โ
J. C. Bowersox
๐
Article
๐
1996
๐
John Wiley and Sons
๐
English
โ 185 KB
Security for wireless internet access
โ
Sarvar Patel; Zulfikar Ramzan; Ganapathy S. Sundaram
๐
Article
๐
2002
๐
Institute of Electrical and Electronics Engineers
๐
English
โ 125 KB
๐ 1 views