The advent of trusted computer operating systems

  • Authors:
  • Stephen T. Walker

  • Affiliations:
  • Washington, DC

  • Venue:
  • AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
  • Year:
  • 1980

Quantified Score

Hi-index 0.00

Visualization

Abstract

The need to trust a computer system processing sensitive information has existed since the earliest uses of computers. As the effectiveness of computer systems has improved, the desire to utilize them in increasingly more important and consequently more sensitive information processing applications has grown rapidly. Sensitive information must be protected from unauthorized access or modification. But without trusted internal access control mechanisms, the computer has to be treated as a device operating at a single sensitivity level.