The use of passwords for controlling access to remote computer systems and services.
Helen M. WoodPublished in: AFIPS National Computer Conference (1977)
Keyphrases
- computer systems
- remote access
- data processing
- hardware and software
- operating system
- user authentication
- communication systems
- information systems
- information processing systems
- service providers
- computer technology
- internet services
- computing systems
- web services
- computer networks
- high end
- computer security
- network access
- context aware
- exchange information
- access control
- user requests
- computer architecture
- database systems
- data model
- directory service
- databases
- computer hardware
- cloud computing