Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
ACM president's letter: a scientist's view of government control over scientific publication
Communications of the ACM
Vulnerabilities of EFTs to intentionally caused losses
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
Computer Networks
Information Systems Security
An Introduction to Database Systems
An Introduction to Database Systems
Database Security and Integrity
Database Security and Integrity
Computer Fraud and Countermeasures
Computer Fraud and Countermeasures
ACM SIGOPS Operating Systems Review
Digital signature schemes for computer communication networks
SIGCOMM '81 Proceedings of the seventh symposium on Data communications
Identifier protection in a distributed operating system
ACM SIGOPS Operating Systems Review
The Cambridge CAP computer and its operating system (Operating and programming systems series)
The Cambridge CAP computer and its operating system (Operating and programming systems series)
Hi-index | 0.00 |
Presented is an overview of computer security, including concepts, techniques, and measures relating to the protection of computing systems and the information they maintain against deliberate or accidental threats. Motivations for security measures are discussed. Security strategies are considered. Actions and events that threaten security are described, along with technical problems that can prevent the computer from adequately dealing with threats. Security models are surveyed. Specific technical and administrative measures for promoting security are described. Among the technical measures discussed are design of secure systems, hardware and operating systems, identification of users, encryption, and access control packages. Administrative measures include personnel, physical security of the computing system, and auditing. Also presented is the establishment of a security program. Reviewed are special problems and their solutions, including communications and networks, data base management systems, and statistical data bases. This paper is based on a paper by the author published in The Handbook of Computers and Computing, edited by Arthur H. Seidman and Ivan Flores, Van Nostrand Reinhold Company, Inc., New York (1984).