Computer Security - A Survey
暂无分享,去创建一个
[1] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[2] Peter S. Browne. Data privacy and integrity: an overview , 1971, SIGFIDET '71.
[3] Roy N. Freed,et al. Computer fraud— a management trap: Risks are legal, economic, professional , 1969 .
[4] Peter J. Denning,et al. Third Generation Computer Systems , 1971, CSUR.
[5] John M. Carroll,et al. Fast "infinite-key" privacy transformation for resource-sharing systems , 1899, AFIPS '70 (Fall).
[6] Victor Lesser,et al. A multi-level computer organization designed to separate data-accessing from the computation , 1968 .
[7] William S. Bates,et al. Security of Computer-Based Information Systems. , 1970 .
[8] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[9] John M. Carroll,et al. Multi-dimensional security program for a generalized information retrieval system , 1899, AFIPS '71 (Fall).
[10] W. A. Notz,et al. An experimental application of cryptography to a remotely accessed data system , 1972, ACM Annual Conference.
[11] Richard J. Healy,et al. Emergency and disaster planning , 1969 .
[12] Clark Weissman,et al. The SDC Time-Sharing System revisited , 1967, ACM '67.
[13] Willis H. Ware,et al. Security and privacy: similarities and differences , 1967, AFIPS '67 (Spring).
[14] Abraham Sinkov,et al. Elementary Cryptanalysis: A Mathematical Approach , 1970 .
[15] James Martin. Design of Real-Time Computer Systems , 1967 .
[16] Roy H. Lauren. Reliability of Data Bank Records. , 1970 .
[17] A. Norman,et al. The Computerized Society , 1970 .
[18] F. J. Corbató,et al. Introduction and overview of the multics system , 1965, AFIPS '65 (Fall, part I).
[19] H. E. Petersen,et al. System implications of information privacy , 1899, AFIPS '67 (Spring).
[20] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.
[21] John Wessler. Physical Security...Facts and Fancies. , 1971 .
[22] Leonard I. Krauss,et al. Administering and Controlling: The Company Data Processing Function , 1972 .
[23] Peter S. Browne,et al. A model for access control , 1971, SIGFIDET '71.
[24] Lance J. Hoffman,et al. The formulary model for flexible privacy and access controls , 1899, AFIPS '71 (Fall).
[25] D. Van Tassel. A Contingency Plan for Catastrophe. , 1971 .
[26] Theodore D. Friedman,et al. The Authorization Problem in Shared Files , 1970, IBM Syst. J..
[27] Richard J. Healy. Design for Security , 1968 .
[28] Maurice V. Wilkes,et al. Time-sharing computer systems , 1968 .
[29] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.
[30] Bernard Peters,et al. Security considerations in a multi-programmed computer system , 1967, AFIPS '67 (Spring).
[31] Richard R. Linde,et al. The ADEPT-50 time-sharing system , 1969, AFIPS '69 (Fall).
[32] Jerome A. Feldman. ASPECTS OF ASSOCIATIVE PROCESSING , 1965 .
[33] David C. Evans,et al. Address mapping and the control of access in an interactive computer , 1967, AFIPS '67 (Spring).
[34] Robert L. Dennis,et al. SECURITY IN THE COMPUTER ENVIRONMENT , 1966 .
[35] Charles F. Hemphill. Security for business and industry , 1971 .
[36] Lance J. Hoffman,et al. Computers and Privacy: A Survey , 1969, CSUR.
[37] Per Brinch Hansen,et al. The nucleus of a multiprogramming system , 1970, CACM.
[38] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[39] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[40] Edward L. Glaser,et al. A brief description of privacy measures in the multics operating system , 1967, AFIPS '67 (Spring).
[41] E. F. Codd,et al. Data description, access and control : proceedings of 1971 ACM-SIGFIDET Workshop, San Diego, California, November 11-12, 1971 , 1971 .
[42] R. C. Owens. PRIMARY ACCESS CONTROL IN LARGE-SCALE TIME-SHARED DECISION SYSTEMS , 1971 .
[43] Dennie Van Tassel,et al. Computer crime , 1970, AFIPS '70 (Fall).
[44] Isadore Enger,et al. AUTOMATIC SECURITY CLASSIFICATION STUDY , 1967 .
[45] Edward L. Glaser. The safeguarding of information: a user's view , 1968, IFIP Congress.
[46] Arie Shoshani,et al. Synchronization in a parallel-accessed data base , 1969, CACM.
[47] Richard C. Owens. Evaluation of access authorization characteristics of derived data sets , 1971, SIGFIDET '71.
[48] Willis H. Ware,et al. Security and privacy in computer systems , 1899, AFIPS '67 (Spring).
[49] Butler W. Lampson,et al. A scheduling philosophy for multiprocessing systems , 1968, CACM.
[50] H. E. Petersen,et al. SECURITY OF COMPUTERIZED INFORMATION SYSTEMS , 1970 .
[51] Robert C. Daley,et al. The Multics virtual memory , 1972, Commun. ACM.
[52] V. A. Vyssotsky,et al. Structure of the multics supervisor , 1965, AFIPS '65 (Fall, part I).
[53] William L. Maxwell,et al. Selective security capabilities in ASAP: a file management system , 1972, AFIPS '72 (Spring).
[54] Edsger W. Dijkstra,et al. The structure of the “THE”-multiprogramming system , 1968, CACM.
[55] P. G. Neumann,et al. A general-purpose file system for secondary storage , 1965, Published in AFIPS '65 (Fall, part I).
[56] R. Stockton Gaines,et al. An operating system based on the concept of a supervisory computer , 1972, CACM.
[57] William L. Maxwell,et al. On the implementation of security measures in information systems , 1972, CACM.
[58] A. Nico Habermann,et al. Prevention of system deadlocks , 1969, CACM.
[59] Lee M. Molho. Hardware aspects of secure computing , 1970, AFIPS '70 (Spring).
[60] E. L. Glaser,et al. System design of a computer for time sharing applications , 1965, AFIPS '65 (Fall, part I).
[61] R. O. Skatrud,et al. A consideration of the application of cryptographic techniques to data processing , 1969, AFIPS '69 (Fall).
[62] Jack B. Dennis,et al. Segmentation and the Design of Multiprogrammed Computer Systems , 1965, JACM.
[63] Edward V. Comber. Management of confidential information , 1969, AFIPS '69 (Fall).
[64] Morris H. Hansen,et al. Insuring confidentiality of individual records in data storage and retrieval for statistical purposes , 1899, AFIPS '71 (Fall).
[65] Dennie Van Tassel. Advanced cryptographic techniques for computer , 1969, CACM.
[66] Butler W. Lampson,et al. A user machine in a time-sharing system , 1966 .
[67] J. D. Babcock. A brief description of privacy measures in the RUSH time-sharing system , 1967, AFIPS '67 (Spring).
[68] Reuben S. Jones. Data file two: a data storage and retrieval system , 1968, AFIPS '68 (Spring).
[69] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[70] Paul Baran. ON DISTRIBUTED COMMUNICATIONS: IX. SECURITY, SECRECY, AND TAMPER-FREE CONSIDERATIONS, , 1964 .