PRIMARY ACCESS CONTROL IN LARGE-SCALE TIME-SHARED DECISION SYSTEMS
PRIMARY ACCESS CONTROL IN LARGE-SCALE TIME-SHARED DECISION SYSTEMS
On the encipherment of search trees and random access files
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
Protection and the control of information sharing in multics
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
IBM data communications: a quarter century of evolution and progress
IBM Journal of Research and Development
Hi-index | 0.03 |
An experimental system has been developed which illustrates ways cryptography can be applied to certain data-security problems concerning remotely accessible data files. These problems are in two main classes: security of data while in transit over communications lines and security of data while in storage. The system makes use of a combination of software and special hardware to provide enciphering and deciphering of messages between a terminal and a data processor. Not only is the content of messages secured from eaves-droppers but also special means are employed to ensure the validity and integrity of messages, of particular significance for file-updating commands. It is also shown how a more restricted kind of protection is afforded data stored in files.