Privacy and Security Issues in Information Systems
IEEE Transactions on Computers
A legal structure for a national medical data center
AFIPS '68 (Fall, part I) Proceedings of the December 9-11, 1968, fall joint computer conference, part I
Hardware aspects of secure computing
AFIPS '70 (Spring) Proceedings of the May 5-7, 1970, spring joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
A homophonic cipher for computational cryptography
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Insuring individual's privacy from statistical data base users
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
The authorization problem in shared files
IBM Systems Journal
Identity in the Information Society
Features and benefits of trusted computing
2009 Information Security Curriculum Development Conference
Hi-index | 0.00 |
With the advent of computer systems which share the resources of the configuration among several users or several problems, there is the risk that information from one user (or computer program) will be coupled to another user (or program). In many cases, the information in question will bear a military classification or be sensitive for some reason, and safeguards must be provided to guard against the leakage of information. This session is concerned with accidents or deliberate attempts which divulge computer-resident information to unauthorized parties.