... of his last logon and how many times his password has been given incorrectly ( if ever) since his last successful logon. ... Thus techniques must change to counter these changing threats if the system audit is to be successful. ... aquot;Security Requirements for Automatic Data Processing (ADP) Systems, aquot; Department of Defense Manual 5200.28, December 1972. 2. ... J. C. Whitmore, et al., aquot;Design for Multics Security Enhancements, aquot; ESD-TR-74-176, Honeywell Information Systems 1974.
|Title||:||Proceedings of the Symposium on Trends and Applications|
|Author||:||Symposium on Trends and Applications|