z-logo
open-access-imgOpen Access
EPICS: Channel Access security design
Author(s) -
M.R. Kraimer,
John M. Hill
Publication year - 1994
Language(s) - English
Resource type - Reports
DOI - 10.2172/204646
Subject(s) - programmer , computer science , computer security model , access control , channel (broadcasting) , interface (matter) , logical security , code (set theory) , computer security , protocol (science) , software security assurance , security service , operating system , programming language , information security , computer network , set (abstract data type) , bubble , maximum bubble pressure method , medicine , alternative medicine , pathology
This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer`s interface is given. Security protocol is described and finally aids for reading the access security code are provided

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here