Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
Protection in an information processing utility
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
A general-purpose file system for secondary storage
AFIPS '65 (Fall, part I) Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I
Communications, computers and people
AFIPS '65 (Fall, part II) Proceedings of the November 30--December 1, 1965, fall joint computer conference, part II: computers: their impact on society
Security and privacy in computer systems
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security considerations in a multi-programmed computer system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security and privacy: similarities and differences
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
A consideration of the application of cryptographic techniques to data processing
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Hi-index | 0.00 |
The problem of sharing information while protecting proprietary data in large computer files is reviewed. The author suggests certain guidelines for data protection in general-purpose, time-sharing systems, and develops a model of a secured shared file. Operation of the system based on these guidelines is discussed.