Security in computing
A note on the confinement problem
Communications of the ACM
A security architecture for office automation systems
A security architecture for office automation systems
Security in a networked environment
ACM SIGAPP Applied Computing Review - Special issue on security
Hi-index | 0.00 |
Security of small computing devices networked locally or over long haul networks need not be accomplished without adequate protection of the data being processed. There are adequate commercial products and techniques available today to secure data requiring protection while it is being viewed, processed, stored, or transmitted. The key to protection in such environments is risk assessment, proper integration of protection mechanisms, and assurance of protection.