Selective security capabilities in ASAP: a file management system
暂无分享,去创建一个
Although the general requirements of data security in file management and retrieval systems are fairly obvious, and have been often stated current practice does not provide even an approximation of these requirements and, in fact, current languages and operating systems, with few exceptions make it relatively difficult to achieve these objectives when one tries to do so. Apparently, current languages and hardware serve as an informal security and privacy protection system that is more or less satisfactory for most current applications. While security and privacy controls are often discussed, they do not appear to be high on most managers' lists of pressing problems.
[1] Lance J. Hoffman,et al. Computers and Privacy: A Survey , 1969, CSUR.
[2] William S. Bates,et al. Security of Computer-Based Information Systems. , 1970 .
[3] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[4] Lee M. Molho. Hardware aspects of secure computing , 1970, AFIPS '70 (Spring).
[5] H. E. Petersen,et al. System implications of information privacy , 1899, AFIPS '67 (Spring).