Empirical Tests of an Additive Random Number Generator
Journal of the ACM (JACM)
Serial Correlation in the Generation of Pseudo-Random Numbers
Journal of the ACM (JACM)
Mixed Congruential Random Number Generators for Binary Machines
Journal of the ACM (JACM)
Security considerations in a multi-programmed computer system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
A consideration of the application of cryptographic techniques to data processing
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Organization of a natural resources data bank system
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
The emergence of the computer utility
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Multi-dimensional security program for a generalized information retrieval system
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
The use of passwords for controlling access to remote computer systems and services
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
Privacy transformations for databank systems
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Computer network cryptography engineering
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Cryptography using modular software elements
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Hi-index | 0.00 |
In all systems affording real-time multiple access to shared computing resources, there exists the risk that information belonging to one user, may, contrary to his intent, become available to other users, and there is the additional risk that outside agencies may infiltrate the system and obtain information. Protection of information within central processors, auxiliary storage (disk, drum), and on-site bulk storage (tape), is a responsibility of the system; the responsibility for the protection of information in external communication links seems presently to devolve by default upon the user. The crux of the privacy issue is the design, evaluation, and implementation of hardware, software, and operating procedures contrived to discharge both of these responsibilities.