large and complex software systems / computer systems / authentication systems / user systems / cryptographic systems / cryptographic algorithms / software methods / software routines / software components / Weak authentication protocols / weak algorithms / cryptographic algorithm / data processing systems / Weak cryptographic algorithms / secure applications / authentication protocols / approach network / /
OperatingSystem
MS-DOS / SunOS / Windows NT / Share / /
Organization
Griffith University / /
Person
Mohammad Heidari / William Stallings / /
Position
guard / resource manager / access matrix model for DAC / programmer / /
Technology
Info technology / Overly weak algorithms / Flow Control / paging system / File Sharing / Paging / Weak authentication protocols / operating system / Weak cryptographic algorithms / Operating Systems / process control / Access Control List / /