A general-purpose file system for secondary storage
AFIPS '65 (Fall, part I) Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I
Some thoughts about the social implications of accessible computing
AFIPS '65 (Fall, part I) Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I
Communications, computers and people
AFIPS '65 (Fall, part II) Proceedings of the November 30--December 1, 1965, fall joint computer conference, part II: computers: their impact on society
Communications needs of the user for management information systems
AFIPS '66 (Fall) Proceedings of the November 7-10, 1966, fall joint computer conference
Security considerations in a multi-programmed computer system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security and privacy: similarities and differences
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
EFTS social and technical issues: what are EFTS?
ACM SIGCAS Computers and Society
Privacy and Security Issues in Information Systems
IEEE Transactions on Computers
Cryptographic techniques for computers
AFIPS '69 (Spring) Proceedings of the May 14-16, 1969, spring joint computer conference
Fast "infinite-key" privacy transformation for resource-sharing systems
AFIPS '70 (Fall) Proceedings of the November 17-19, 1970, fall joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Selective security capabilities in ASAP: a file management system
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Security of information processing: implications from social research
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
The use of passwords for controlling access to remote computer systems and services
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
A homophonic cipher for computational cryptography
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Privacy transformations for databank systems
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Computer network cryptography engineering
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Insuring individual's privacy from statistical data base users
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
The authorization problem in shared files
IBM Systems Journal
Identity in the Information Society
Hi-index | 0.00 |
Recent advances in computer time-sharing technology promise information systems which will permit simultaneous on-line access to many users at remotely located terminals. In such systems, the question naturally arises of protecting one user's stored programs and data against unauthorized access by others. Considerable work has already been done in providing protection against accidental access due to hardware malfunctions or undebugged programs. Protection against deliberate attempts to gain access to private information, although recently discussed from a philosophical point of view, has attracted only fragmentary technical attention. This paper presents a discussion of the threat to information privacy in non-military information systems, applicable countermeasures, and system implications of providing privacy protection.