Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
Protection in an information processing utility
Communications of the ACM
Compact finite difference schemes for ocean models: 1. Ocean waves
Journal of Computational Physics
Synchronization in a parallel-accessed data base
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
A multi-level computer organization designed to separate data-accessing from the computation
A multi-level computer organization designed to separate data-accessing from the computation
Introduction and overview of the multics system
AFIPS '65 (Fall, part I) Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I
Associative memory system implementation and characteristics
AFIPS '64 (Fall, part I) Proceedings of the October 27-29, 1964, fall joint computer conference, part I
AFIPS '64 (Fall, part I) Proceedings of the October 27-29, 1964, fall joint computer conference, part I
A hardware-integrated GPC/search memory
AFIPS '64 (Fall, part I) Proceedings of the October 27-29, 1964, fall joint computer conference, part I
Address mapping and the control of access in an interactive computer
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
A brief description of privacy measures in the RUSH time-sharing system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Data file two: a data storage and retrieval system
AFIPS '68 (Spring) Proceedings of the April 30--May 2, 1968, spring joint computer conference
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
A consideration of the application of cryptographic techniques to data processing
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Worst-case costs for dynamic data element security decisions
ACM '74 Proceedings of the 1974 annual ACM conference - Volume 2
ACCNET: a corporate computer network
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Integrity aspects of a shared data base
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Hi-index | 0.00 |
This paper presents a model for engineering the user interface for large data base systems in order to maintain flexible access controls over sensitive data. The model is independent of both machine and data base structure, and is sufficiently modular to allow cost-effectiveness studies on access mechanisms. Access control is based on sets of procedures called formularies. The decision on whether a user can read, write, update, etc., data is controlled by programs (not merely bits or tables of data) which can be completely independent of the contents or location of raw data in the data base.