On the implementation of security measures in information systems

The security of an information system may be represented by a model matrix whose elements are decision rules and whose row and column indices are users and data items respectively. A set of four functions is used to access this matrix at translation and execution time. Distinguishing between data dependent and data independent decision rules enables one to perform much of the checking of security only once at translation time rather than repeatedly at execution time. The model is used to explain security features of several existing systems, and serves as a framework for a proposal for general security system implementation within today's languages and operating systems.

[1]  Lance J. Hoffman,et al.  Computers and Privacy: A Survey , 1969, CSUR.

[2]  John M. Carroll,et al.  Fast "infinite-key" privacy transformation for resource-sharing systems , 1899, AFIPS '70 (Fall).

[3]  William L. Maxwell,et al.  Selective security capabilities in ASAP: a file management system , 1972, AFIPS '72 (Spring).

[4]  A. Norman,et al.  The Computerized Society , 1970 .

[5]  A. Miller The assault on privacy : computers, data banks, and dossiers , 1972 .

[6]  Paul Baran ON DISTRIBUTED COMMUNICATIONS: IX. SECURITY, SECRECY, AND TAMPER-FREE CONSIDERATIONS, , 1964 .

[7]  Harvey W. Bingham SECURITY TECHNIQUES FOR EDP OF MULTILEVEL CLASSIFIED INFORMATION , 1965 .

[8]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[9]  Lance Joel Hoffman,et al.  The formulary model for access control and privacy in computer systems , 2018 .

[10]  Codasyl Systems CommitteeCORPORATE Introduction to feature analysis of generalized data base management systems , 1971 .

[11]  Edgar H. Sibley,et al.  A survey of generalized data base management systems, May 1969 , 1969 .

[12]  B. A. Berkman,et al.  The Assault on Privacy: Computers, Data Banks, and Dossiers, by Arthur R. Miller , 1971 .

[13]  R. O. Skatrud The application of cryptographic techniques to data processing , 1899 .

[14]  Edgar H. Sibley,et al.  Feature analysis of generalized data base management systems: CODASYL Systems Committee, May 1971 , 1971 .

[15]  H. E. Petersen,et al.  System implications of information privacy , 1899, AFIPS '67 (Spring).