November 1981 - Vol. 24 No. 11
Features
Documentation for a model: a hierarchical approach
A set of documents and their organization according to functional requirements in order to produce information that will facilitate the use of models are described. The…
Microcomputers as remote nodes of a distributed system
A time-sharing system may be extended into a general-purpose distributed computing facility through the use of remote microcomputer systems. In such an extension the…
The evolution of user behavior in a computerized conferencing system
Data from 18-month operational trials of the EIES system indicate that the range of features considered valuable in a computer-based communication system increases with…
An experimental study of the human/computer interface
An exploratory study was conducted to analyze whether interface and user characteristics affect decision effectiveness and subject behavior in an interactive…
Problems in application software maintenance
The problems of application software maintenance in 487 data processing organizations were surveyed. Factor analysis resulted in the identification of six problem…
Password authentication with insecure communication
A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the…
Authentication of signatures using public key encryption
One of Needham and Schroeder's proposed signature authentication protocols is shown to fail when there is a possibility of compromised keys: this invalidates one of the…