Hardware aspects of secure computing

  • Authors:
  • Lee M. Molho

  • Affiliations:
  • System Development Corporation, Santa Monica, California

  • Venue:
  • AFIPS '70 (Spring) Proceedings of the May 5-7, 1970, spring joint computer conference
  • Year:
  • 1970

Quantified Score

Hi-index 0.00

Visualization

Abstract

It makes no sense to discuss software for privacy-preserving or secure time-shared computing without considering the hardware on which it is to run. Software access controls rely upon certain pieces of hardware. If these can go dead or be deliberately disabled without warning, then all that remains is false security.