The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology / Helen M. Wood.

This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and...

Full description

Bibliographic Details
Main Author: Wood, Helen M.
Corporate Author: National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology
Language:English
Published: [Place of publication not identified] : Distributed by ERIC Clearinghouse, 1977.
Subjects:
Genre:
Physical Description:60 pages
Format: Microfilm Book

System Under Maintenance

Our Library Management System is currently under maintenance.

Holdings and item availability information is currently unavailable. Please accept our apologies for any inconvenience this may cause and contact us for further assistance:

Please contact Reference and Discovery Services via their Contact Form or call them directly at: 517-353-8700 for assistance.