Computer Security - A Survey

[1]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[2]  Peter S. Browne Data privacy and integrity: an overview , 1971, SIGFIDET '71.

[3]  Roy N. Freed,et al.  Computer fraud— a management trap: Risks are legal, economic, professional , 1969 .

[4]  Peter J. Denning,et al.  Third Generation Computer Systems , 1971, CSUR.

[5]  John M. Carroll,et al.  Fast "infinite-key" privacy transformation for resource-sharing systems , 1899, AFIPS '70 (Fall).

[6]  Victor Lesser,et al.  A multi-level computer organization designed to separate data-accessing from the computation , 1968 .

[7]  William S. Bates,et al.  Security of Computer-Based Information Systems. , 1970 .

[8]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[9]  John M. Carroll,et al.  Multi-dimensional security program for a generalized information retrieval system , 1899, AFIPS '71 (Fall).

[10]  W. A. Notz,et al.  An experimental application of cryptography to a remotely accessed data system , 1972, ACM Annual Conference.

[11]  Richard J. Healy,et al.  Emergency and disaster planning , 1969 .

[12]  Clark Weissman,et al.  The SDC Time-Sharing System revisited , 1967, ACM '67.

[13]  Willis H. Ware,et al.  Security and privacy: similarities and differences , 1967, AFIPS '67 (Spring).

[14]  Abraham Sinkov,et al.  Elementary Cryptanalysis: A Mathematical Approach , 1970 .

[15]  James Martin Design of Real-Time Computer Systems , 1967 .

[16]  Roy H. Lauren Reliability of Data Bank Records. , 1970 .

[17]  A. Norman,et al.  The Computerized Society , 1970 .

[18]  F. J. Corbató,et al.  Introduction and overview of the multics system , 1965, AFIPS '65 (Fall, part I).

[19]  H. E. Petersen,et al.  System implications of information privacy , 1899, AFIPS '67 (Spring).

[20]  Jerome H. Saltzer,et al.  A hardware architecture for implementing protection rings , 1972, CACM.

[21]  John Wessler Physical Security...Facts and Fancies. , 1971 .

[22]  Leonard I. Krauss,et al.  Administering and Controlling: The Company Data Processing Function , 1972 .

[23]  Peter S. Browne,et al.  A model for access control , 1971, SIGFIDET '71.

[24]  Lance J. Hoffman,et al.  The formulary model for flexible privacy and access controls , 1899, AFIPS '71 (Fall).

[25]  D. Van Tassel A Contingency Plan for Catastrophe. , 1971 .

[26]  Theodore D. Friedman,et al.  The Authorization Problem in Shared Files , 1970, IBM Syst. J..

[27]  Richard J. Healy Design for Security , 1968 .

[28]  Maurice V. Wilkes,et al.  Time-sharing computer systems , 1968 .

[29]  Jack B. Dennis,et al.  Programming semantics for multiprogrammed computations , 1966, CACM.

[30]  Bernard Peters,et al.  Security considerations in a multi-programmed computer system , 1967, AFIPS '67 (Spring).

[31]  Richard R. Linde,et al.  The ADEPT-50 time-sharing system , 1969, AFIPS '69 (Fall).

[32]  Jerome A. Feldman ASPECTS OF ASSOCIATIVE PROCESSING , 1965 .

[33]  David C. Evans,et al.  Address mapping and the control of access in an interactive computer , 1967, AFIPS '67 (Spring).

[34]  Robert L. Dennis,et al.  SECURITY IN THE COMPUTER ENVIRONMENT , 1966 .

[35]  Charles F. Hemphill Security for business and industry , 1971 .

[36]  Lance J. Hoffman,et al.  Computers and Privacy: A Survey , 1969, CSUR.

[37]  Per Brinch Hansen,et al.  The nucleus of a multiprogramming system , 1970, CACM.

[38]  Butler W. Lampson,et al.  Dynamic protection structures , 1899, AFIPS '69 (Fall).

[39]  Clark Weissman,et al.  Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).

[40]  Edward L. Glaser,et al.  A brief description of privacy measures in the multics operating system , 1967, AFIPS '67 (Spring).

[41]  E. F. Codd,et al.  Data description, access and control : proceedings of 1971 ACM-SIGFIDET Workshop, San Diego, California, November 11-12, 1971 , 1971 .

[42]  R. C. Owens PRIMARY ACCESS CONTROL IN LARGE-SCALE TIME-SHARED DECISION SYSTEMS , 1971 .

[43]  Dennie Van Tassel,et al.  Computer crime , 1970, AFIPS '70 (Fall).

[44]  Isadore Enger,et al.  AUTOMATIC SECURITY CLASSIFICATION STUDY , 1967 .

[45]  Edward L. Glaser The safeguarding of information: a user's view , 1968, IFIP Congress.

[46]  Arie Shoshani,et al.  Synchronization in a parallel-accessed data base , 1969, CACM.

[47]  Richard C. Owens Evaluation of access authorization characteristics of derived data sets , 1971, SIGFIDET '71.

[48]  Willis H. Ware,et al.  Security and privacy in computer systems , 1899, AFIPS '67 (Spring).

[49]  Butler W. Lampson,et al.  A scheduling philosophy for multiprocessing systems , 1968, CACM.

[50]  H. E. Petersen,et al.  SECURITY OF COMPUTERIZED INFORMATION SYSTEMS , 1970 .

[51]  Robert C. Daley,et al.  The Multics virtual memory , 1972, Commun. ACM.

[52]  V. A. Vyssotsky,et al.  Structure of the multics supervisor , 1965, AFIPS '65 (Fall, part I).

[53]  William L. Maxwell,et al.  Selective security capabilities in ASAP: a file management system , 1972, AFIPS '72 (Spring).

[54]  Edsger W. Dijkstra,et al.  The structure of the “THE”-multiprogramming system , 1968, CACM.

[55]  P. G. Neumann,et al.  A general-purpose file system for secondary storage , 1965, Published in AFIPS '65 (Fall, part I).

[56]  R. Stockton Gaines,et al.  An operating system based on the concept of a supervisory computer , 1972, CACM.

[57]  William L. Maxwell,et al.  On the implementation of security measures in information systems , 1972, CACM.

[58]  A. Nico Habermann,et al.  Prevention of system deadlocks , 1969, CACM.

[59]  Lee M. Molho Hardware aspects of secure computing , 1970, AFIPS '70 (Spring).

[60]  E. L. Glaser,et al.  System design of a computer for time sharing applications , 1965, AFIPS '65 (Fall, part I).

[61]  R. O. Skatrud,et al.  A consideration of the application of cryptographic techniques to data processing , 1969, AFIPS '69 (Fall).

[62]  Jack B. Dennis,et al.  Segmentation and the Design of Multiprogrammed Computer Systems , 1965, JACM.

[63]  Edward V. Comber Management of confidential information , 1969, AFIPS '69 (Fall).

[64]  Morris H. Hansen,et al.  Insuring confidentiality of individual records in data storage and retrieval for statistical purposes , 1899, AFIPS '71 (Fall).

[65]  Dennie Van Tassel Advanced cryptographic techniques for computer , 1969, CACM.

[66]  Butler W. Lampson,et al.  A user machine in a time-sharing system , 1966 .

[67]  J. D. Babcock A brief description of privacy measures in the RUSH time-sharing system , 1967, AFIPS '67 (Spring).

[68]  Reuben S. Jones Data file two: a data storage and retrieval system , 1968, AFIPS '68 (Spring).

[69]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[70]  Paul Baran ON DISTRIBUTED COMMUNICATIONS: IX. SECURITY, SECRECY, AND TAMPER-FREE CONSIDERATIONS, , 1964 .