Fast "infinite-key" privacy transformation for resource-sharing systems

In all systems affording real-time multiple access to shared computing resources, there exists the risk that information belonging to one user, may, contrary to his intent, become available to other users, and there is the additional risk that outside agencies may infiltrate the system and obtain information. Protection of information within central processors, auxiliary storage (disk, drum), and on-site bulk storage (tape), is a responsibility of the system; the responsibility for the protection of information in external communication links seems presently to devolve by default upon the user. The crux of the privacy issue is the design, evaluation, and implementation of hardware, software, and operating procedures contrived to discharge both of these responsibilities.