On the implementation of security measures in information systems
暂无分享,去创建一个
[1] Lance J. Hoffman,et al. Computers and Privacy: A Survey , 1969, CSUR.
[2] John M. Carroll,et al. Fast "infinite-key" privacy transformation for resource-sharing systems , 1899, AFIPS '70 (Fall).
[3] William L. Maxwell,et al. Selective security capabilities in ASAP: a file management system , 1972, AFIPS '72 (Spring).
[4] A. Norman,et al. The Computerized Society , 1970 .
[5] A. Miller. The assault on privacy : computers, data banks, and dossiers , 1972 .
[6] Paul Baran. ON DISTRIBUTED COMMUNICATIONS: IX. SECURITY, SECRECY, AND TAMPER-FREE CONSIDERATIONS, , 1964 .
[7] Harvey W. Bingham. SECURITY TECHNIQUES FOR EDP OF MULTILEVEL CLASSIFIED INFORMATION , 1965 .
[8] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[9] Lance Joel Hoffman,et al. The formulary model for access control and privacy in computer systems , 2018 .
[10] Codasyl Systems CommitteeCORPORATE. Introduction to feature analysis of generalized data base management systems , 1971 .
[11] Edgar H. Sibley,et al. A survey of generalized data base management systems, May 1969 , 1969 .
[12] B. A. Berkman,et al. The Assault on Privacy: Computers, Data Banks, and Dossiers, by Arthur R. Miller , 1971 .
[13] R. O. Skatrud. The application of cryptographic techniques to data processing , 1899 .
[14] Edgar H. Sibley,et al. Feature analysis of generalized data base management systems: CODASYL Systems Committee, May 1971 , 1971 .
[15] H. E. Petersen,et al. System implications of information privacy , 1899, AFIPS '67 (Spring).