Abstract
This paper proposes a control mechanism for the user interface. This mechanism provides two principal services of frequent importance in interactive systems: management of alternate file input, and log files. The mechanism is independent of the command language interpreter and thus its services are available to all programs.
- Bourne, S. R., "The UNIX Shell," Bell System Technical Journal, V57, 1978, pp. 1971--1990.Google ScholarCross Ref
- Ellis, J. R., "A LISP Shell," ACM SIGPLAN NOTICES, V15 (5), May 1980, pp. 24--34. Google ScholarDigital Library
- IBM Corp., IBM Virtual Machine/Facility/370: CMS Command and Macro Reference, GC20-1818-2, White Plains, N. Y., 1979Google Scholar
- Rayner, D. "Designing User Interfaces for Friendliness," in "Command Language Directions," D. Beech (ed), North-Holland, New York, 1980.Google Scholar
- Mooney, J. DOS LEVEL 5 REFERENCE MANUAL, Itek Composition Systems, internal document, 1979.Google Scholar
Recommendations
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
ANSS '06: Proceedings of the 39th annual Symposium on SimulationAnomaly detection systems largely depend on user profile data to be able to detect deviations from normal activity. Most of this profile data is currently based on command-line instructions/directives executed by users on a system. With the advent and ...
A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01In this paper, we present constructions for 3GPP Authentication and Key Agreement (AKA) that provides Perfect Forward Secrecy for the session key. Further, the constructs prevents an attacker, with access to the long-term pre-shared key, from simply ...
USIM-based EAP-TLS authentication protocol for wireless local area networks
Due to the rapid growth in popularity of Wireless Local Area Network (WLAN), wireless security has become one of many important research issues. For the WLAN security, the IEEE 802.1X standard provides an authentication framework that is based on the ...
Comments