Privacy and Security Issues in Information Systems
IEEE Transactions on Computers
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Multiprogramming: promise, performance and prospect
AFIPS '68 (Fall, part I) Proceedings of the December 9-11, 1968, fall joint computer conference, part I
Fast "infinite-key" privacy transformation for resource-sharing systems
AFIPS '70 (Fall) Proceedings of the November 17-19, 1970, fall joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
The use of passwords for controlling access to remote computer systems and services
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
A homophonic cipher for computational cryptography
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Insuring individual's privacy from statistical data base users
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
The authorization problem in shared files
IBM Systems Journal
Hi-index | 0.00 |
Security can not be attained in the absolute sense. Every security system seeks to attain a probability of loss which is commensurate with the value returned by the operation being secured. For each activity which exposes private, valuable, or classified information to possible loss, it is necessary that reasonable steps be taken to reduce the probability of loss. Further, any loss which might occur must be detected. There are several minimum requirements to establish an adequate security level for the software of a large multi-programmed system with remote terminals.