Special Feature The Total Computer Security Problem: an Oveview

As society becomes more dependent on computers, computer crime is becoming not only more disastrous in its potential impact, but also more attractive to the criminal.1-3However, with adequate protection techniques, data theft can be prevented. This paper analyzes the total computer system security problem, using six major factors to sort out the issues involved. The entire problem is visualized in Figure 1, with the six factors listed along the left-hand side.

[1]  Robert F. Hargraves,et al.  Design considerations for an educational time-sharing system , 1969, AFIPS '69 (Spring).

[2]  Elliott I. Organick,et al.  Computer System Organization: The B5700/B6700 Series , 1973 .

[3]  David Lorge Parnas,et al.  A technique for software module specification with examples , 1972, CACM.

[4]  W LampsonButler,et al.  Reflections on an operating system design , 1976 .

[5]  D. E. Bell,et al.  A Software Validation Technique for Certification: The Methodology , 1975 .

[6]  Richard A. Meyer,et al.  A Virtual Machine Time-Sharing System , 1970, IBM Syst. J..

[7]  Brian Randell,et al.  System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.

[8]  K. S. Shankar,et al.  On virtual machine integrity , 1976 .

[9]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[10]  Lawrence Robinson,et al.  SPECIAL Reference Manual. , 1977 .

[11]  Jerome H. Saltzer,et al.  A hardware architecture for implementing protection rings , 1972, CACM.

[12]  Butler W. Lampson,et al.  Dynamic protection structures , 1899, AFIPS '69 (Fall).

[13]  L. Smith Architectures for Secure Computing Systems , 1975 .

[14]  Jonathan K. Millen,et al.  Security Kernel validation in practice , 1976, CACM.

[15]  William L. Maxwell,et al.  On the implementation of security measures in information systems , 1972, CACM.

[16]  Gerald J. Popek,et al.  The PDP-11 virtual machine architecture: A case study , 1975, SOSP.

[17]  Clark Weissman Secure computer operation with virtual machine partitioning , 1975, AFIPS '75.

[18]  Philippe Janson,et al.  REMOVING THE DYNAMIC LINKER FROM THE SECURITY KERNEL OF A COMPUTING UTILITY , 1974 .

[19]  D. Parker Crime by computer , 1976 .

[20]  John D. Bagley,et al.  Sharing data and services in a virtual machine system , 1975, SOSP.

[21]  James Marting,et al.  Security, Accuracy, and Privacy in Computer Systems , 1973 .

[22]  Robert C. Daley,et al.  The Multics virtual memory , 1972, Commun. ACM.

[23]  Michael D. Schroeder,et al.  Cooperation of mutually suspicious subsystems in a computer utility , 1972 .

[24]  Jeffrey S. Fenton Memoryless Subsystems , 1974, Comput. J..

[25]  D. L. Parnas,et al.  On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.

[26]  Edsger W. Dijkstra,et al.  The structure of the “THE”-multiprogramming system , 1968, CACM.

[27]  Roger M. Needham,et al.  Protection systems and protection implementations , 1899, AFIPS '72 (Fall, part I).

[28]  William A. Wulf,et al.  HYDRA , 1974, Commun. ACM.

[29]  C. Richard Attanasio,et al.  Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..

[30]  Lawrence Robinson,et al.  Proof techniques for hierarchically structured programs , 1977, CACM.

[31]  Edward A. Feustel,et al.  On The Advantages of Tagged Architecture , 1973, IEEE Transactions on Computers.

[32]  Edwin Weiss,et al.  A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.

[33]  George B. Purdy,et al.  A high security log-in procedure , 1974, Commun. ACM.

[34]  Thomas H. Bredt,et al.  A structured specification of a hierarchical operating system , 1975, Reliable Software.

[35]  Lawrence Robinson,et al.  A Provably Secure Operating System. , 1975 .

[36]  F. J. Corbató,et al.  Multics: the first seven years , 1972, AFIPS '72 (Spring).

[37]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[38]  Dorothy E. Denning,et al.  Secure information flow in computer systems. , 1975 .

[39]  Gerald J. Popek,et al.  Protection structures , 1974, Computer.

[40]  D. F. Stork Downgrading in a Secure Multilevel Computer System: The Formulary Concept , 1975 .

[41]  D. P. Reed,et al.  PROCESSOR MULTIPLEXING IN A LAYED OPERATING SYSTEM , 1976 .

[42]  William A Wulf ALPHARD: Toward a Language to Support Structured Programs , 1974 .

[43]  William Robert Price,et al.  Implications of a virtual memory mechanism for implementing protection in a family of operating systems , 1973 .

[44]  Anita K. Jones,et al.  Protection in programmed systems. , 1973 .

[45]  Maurice V. Wilkes,et al.  Domains of Protection and the Management of Processes , 1974, Computer/law journal.

[46]  Richard C. Holt,et al.  Project SUE as a learning experience , 1972, AFIPS '72 (Fall, part I).

[47]  Jack B. Dennis,et al.  Virtual memory, processes, and sharing in Multics , 1967, CACM.

[48]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[49]  Michael D. Schroeder Engineering a security kernel for Multics , 1975, SOSP.

[50]  William A. Wulf,et al.  Policy/mechanism separation in Hydra , 1975, SOSP.

[51]  J. O'reilly The Privacy Act of 1974. , 1975 .

[52]  C. A. R. Hoare,et al.  Monitors: an operating system structuring concept , 1974, CACM.

[53]  Robert W. Floyd,et al.  Assigning meaning to programs , 1967 .

[54]  J PopekGerald,et al.  The PDP-11 virtual machine architecture , 1975 .

[55]  Edsger W. Dijkstra,et al.  Co-operating sequential processes , 1968 .

[56]  William A. Wulf,et al.  Towards the design of secure systems , 1975, Softw. Pract. Exp..

[57]  Edward A. Feustel OnTheAdvantages ofTagged Architecture , 1973 .

[58]  Stuart E. Madnick,et al.  Hierarchical Approach to Computer System Integrity , 1975, IBM Syst. J..

[59]  Jerome H. Saltzer,et al.  Protection and the control of information sharing in multics , 1974, CACM.

[60]  R. G. Bratt MINIMIZING THE NAMING FACILITIES REQUIRING PROTECTION IN A COMPUTING UTILITY , 1975 .

[61]  William A. Wulf,et al.  BLISS: a language for systems programming , 1971, CACM.

[62]  David D. Redell,et al.  NAMING AND PROTECTION IN EXTENDABLE OPERATING SYSTEMS , 1974 .

[63]  Leo Joseph Rotenberg,et al.  Making computers keep secrets , 1973 .

[64]  David Jefferson,et al.  Protection in the Hydra Operating System , 1975, SOSP.

[65]  Philippe A. Janson Dynamic linking and environment initialization in a multi-domain process. , 1975, SOSP.

[66]  Karl N. Levitt,et al.  Greatest Common Divisor of n Integers and Multipliers (Certification of Algorithm 386) , 1973, Commun. ACM.

[67]  Elliott I. Organick,et al.  The multics system: an examination of its structure , 1972 .

[68]  David Lorge Parnas,et al.  On a 'Buzzword': Hierarchical Structure , 2001, IFIP Congress.

[69]  K. S. Shankar,et al.  Data flow, abstraction levels and specifications for communications switching systems , 1976, ICSE '76.

[70]  D. Elliott Bell Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .

[71]  William A. Wulf,et al.  Overview of the Hydra Operating System development , 1975, SOSP.

[72]  James P. Anderson,et al.  Information Security in a Multi-User Computer Environment , 1972, Adv. Comput..

[73]  Lawrence Robinson,et al.  An example of hierarchical design and proof , 1978, CACM.

[74]  C. A. R. Hoare,et al.  Procedures and parameters: An axiomatic approach , 1971, Symposium on Semantics of Algorithmic Languages.

[75]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[76]  Robert S. Fabry,et al.  Capability-based addressing , 1974, CACM.