Rules of ethics in information processing
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
A multi-level computer organization designed to separate data-accessing from the computation
A multi-level computer organization designed to separate data-accessing from the computation
ACM SIGSAC Review
Information Systems in Perspective
ACM Computing Surveys (CSUR)
Third Generation Computer Systems
ACM Computing Surveys (CSUR)
A Comparison of the Relational and CODASYL Approaches to Data-Base Management
ACM Computing Surveys (CSUR)
On the implementation of security measures in information systems
Communications of the ACM
Curriculum recommendations for graduate professional programs in information systems
Communications of the ACM
Curriculum recommendations for undergraduate programs in information systems
Communications of the ACM
Easy entry: the password encryption problem
ACM SIGOPS Operating Systems Review
A modular representation of the access control system
ACM SIGOPS Operating Systems Review
The impact of a computers and society course on student perspectives
ACM '73 Proceedings of the ACM annual conference
ACM '73 Proceedings of the ACM annual conference
Design of transaction-oriented systems employing a transaction monitor
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Computers and privacy: What price analytic power?
ACM '71 Proceedings of the 1971 26th annual conference
Principles of computer system organization
SIGCSE '70 Proceedings of the first SIGCSE technical symposium on Education in computer science
Principles of computer system organization
ACM SIGCSE Bulletin
Social implications of computer technology
ACM SIGCAS Computers and Society
Privacy laws affecting system design
ACM SIGCAS Computers and Society
ACM SIGMIS Database
Privacy intrusion detection using dynamic Bayesian networks
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Legal constraints on computer data banks: an overview
ACM SIGUCCS Newsletter
A semantic model for data base protection languages
VLDB '76 Proceedings of the second international conference on Systems for Large Data Bases
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Selective security capabilities in ASAP: a file management system
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Multi-dimensional security program for a generalized information retrieval system
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
The formulary model for flexible privacy and access controls
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
Security of information processing: implications from social research
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
The use of passwords for controlling access to remote computer systems and services
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Insuring individual's privacy from statistical data base users
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
The authorization problem in shared files
IBM Systems Journal
FUN'10 Proceedings of the 5th international conference on Fun with algorithms
Hi-index | 0.05 |