System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Hardware aspects of secure computing
AFIPS '70 (Spring) Proceedings of the May 5-7, 1970, spring joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
A homophonic cipher for computational cryptography
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The authorization problem in shared files
IBM Systems Journal
Identity in the Information Society
Hi-index | 0.01 |
For the purposes of this paper we will use the term "security" when speaking about computer systems which handle classified defense information, and "privacy" in regard to those computer systems which handle non-defense information which nonetheless must be protected because it is in some respect sensitive. It should be noted at the outset that the context in which security must be considered is quite different from that which can be applied to the privacy question. With respect to classified military information there are federal regulations which establish authority, and discipline to govern the conduct of people who work with such information. Moreover, there is an established set of categories into which information is classified. Once information is classified Confidential, Secret, or Top Secret, there are well-defined requirements for its protection, for controlling access to it, and for transmitting it from place to place. In the privacy situation, analogous/conditions may exist only in part or not at all.