skip to main content
10.1145/1500175.1500368acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafipsConference Proceedingsconference-collections
research-article
Free Access

Research in data security: policies and projects

Published:06 May 1974Publication History

ABSTRACT

This session will begin with presentations and a panel discussion by representatives of various governmental agencies involved with research or funding of research in data security. They will present their views on the policies and goals of federally funded research in the area of data security and how this relates to privately funded research and development in this and related areas. They will also have the opportunity to point out new directions which should be pursued. There will be discussion on both the technological and social impact of such funding.

References

  1. Friedman, T. D. and L. J. Hoffman, Execution Time Requirements for Encipherment Programs, University of California Electronics Research Laboratory Memo ERL-M378, June 1, 1973. To appear, Communications of the ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Woodward, F. G. and L. J. Hoffman, Worst-case Costs for Dynamic Data Element Security Decisions, University of California Electronics Research Laboratory Memo ERL-M413, September 26, 1973.Google ScholarGoogle Scholar
  3. Hoffman, L. J., "The Formulary Model for Access Control," Proc. AFIPS 1971 FJCC, Vol. 39, AFIPS Press, pp. 587--601.Google ScholarGoogle Scholar
  4. Bell, D. E. and L. J. LaPadula, Secure Computer Systems: Mathematical Foundations, ESD-TR-73-278, USAF Electronic Systems Division, L. G. Hanscom Field, Bedford, Mass.Google ScholarGoogle Scholar
  5. Baskin, H. B., B. R. Borgerson, and R. Roberts, "PRIME---A Modular Architecture for Terminal-Oriented Systems," Proc. AFIPS 1972 SJCC, pp. 431--437. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hsiao, D. K., "Access Control in An On-Line File System," Working Papers of FILE68---International Seminar on File Organization by I.F.I.P. (I.A.G.) Administrative Data Processing Group, Copenhagen, Denmark, Nov. 1968. The same paper is also included in a book entitled File Organization---Selected Papers from FILE68, an I.A.G. Conference by Studentlitteratur Ab, Lund, Sweden.Google ScholarGoogle Scholar
  7. Hsiao, David K., "Logical Access Control Mechanisms in Computer Systems," Proceedings of Conference on Secure Data Sharing, ONR/NSRDC, Washington, D.C., July 1973.Google ScholarGoogle Scholar
  8. Bergart, J. G., M. Denicoff, and D. K. Hsiao, An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control on Computer Systems, Technical Report OSU-CISRC-TR-72-12, The Department of Computer and Information Science, The Ohio State University, November 1972.Google ScholarGoogle Scholar
  9. McCauley, E. J., III, and D. K. Hsiao, A Model for Data Secure Systems, Technical Report OSU-CISRC-TR-73-8, The Department of Computer and Information Science, The Ohio State University, February 1974.Google ScholarGoogle Scholar
  10. Nee, C. J., and D. K. Hsiao, Theoretical Foundations for Context Protection and Consistent Control in Data Secure Systems, Technical Report OSU-CISRC-TR-73-9, The Department of Computer and Information Science, The Ohio State University, February 1974.Google ScholarGoogle Scholar
  11. Baum, R. I., and D. K. Hsiao, A Data Secure Computer Architecture, Technical Report OSU-CISRC-TR-73-10, The Department of Computer and Information Science, The Ohio State University, March 1974.Google ScholarGoogle Scholar
  12. Hsiao, D. K., and T. Wyrick, System Configuration Study on the Interconnection of the IBM 370/165, DEC System-10 and Micro 1600/21 Computer Systems, Technical Report OSU-CISRC-TR-73-7, The Department of Computer and Information Science and the Instruction and Research Computer Center, The Ohio State University, October 1973.Google ScholarGoogle Scholar
  13. Hsiao, D. K., et al., The PL / X Compiler-Subsystem Writers' Manual, The Instruction and Research Computer Center and The Department of Computer and Information Science, The Ohio State University, August 1973.Google ScholarGoogle Scholar
  14. Hsiao, D. K., et al., The PL / X Programming Language Reference Manual, The Instruction and Research Computer Center and The Department of Computer and Information Science, The Ohio State University, August 1973.Google ScholarGoogle Scholar
  15. Hsiao, D. K., et al., The PL / X Compiler Program Statements, Technical Report OSU-CISRC-TR-73-11, issued jointly by the IRCC and The Department of Computer and Information Science, The Ohio State University, December 1973.Google ScholarGoogle Scholar
  16. Cohen, E. I., D. K. Hsiao, and F. A. Stahl, Distributed Secure Data Bases in Computer Networks, Technical Report OSU-CISRC-TR-73-11, The Department of Computer and Information Science, The Ohio State University, February 1974.Google ScholarGoogle Scholar
  17. Stahl, F. A., "A Homophonic Cipher for Computational Security, Proceedings of the AFIPS National Computer Conference and Exposition, Vol. 42, AFIPS Press, Montvale, N.J., 1973, pp. 565--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Stahl, F. A., On Computational Security, Report R-637, Coordinated Science Laboratory, University of Illinois, Urbana, Illinois, January 1974.Google ScholarGoogle Scholar
  19. Turn, R., and N. Z. Shapiro, "Privacy and Security in Databank Systems: Measures of Effectiveness, Costs, and Protector-Intruder Interactions," AFIPS Conference Proceedings, Vol. 41, Part 1, 1972 Fall Joint Computer Conference, AFIPS Press, Montvale, N.J., 1972, pp. 435--444. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Coates, J. F., Computers and Privacy: Is There a Missing Theorem? Note N-680 (R), Institute for Defense Analysis, Arlington, Va., April 1970.Google ScholarGoogle Scholar
  21. Shapiro, N. Z., and M. Davis, Uncrackable Databanks, R-1382-NSF, The Rand Corporation, December 1973.Google ScholarGoogle Scholar
  22. Reed, I. S., The Application of Information Theory to Privacy in Databanks, R-1282, The Rand Corporation, May 1973.Google ScholarGoogle Scholar
  23. Reed, I. S., "Information Theory and Privacy in Databanks," AFIPS Conference Proceedings, Vol. 42, 1973 National Computer Conference, AFIPS Press, Montvale, N.J., 1973, pp. 581--587. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Johnson, S. M., Certain Number-Theoretic Aspects of Access Control Passwords, R-1433-NSF, The Rand Corporation, March 1974.Google ScholarGoogle Scholar
  25. Turn, R., Privacy and Security in Personal Information Databank Systems, R-1044-NSF, The Rand Corporation, March 1974.Google ScholarGoogle Scholar
  26. Turn, R., Toward Data Security Engineering, P-5142, January 1974.Google ScholarGoogle Scholar
  27. Shapiro, N. Z., M. L. Juncosa, and R. Turn, Privacy and Security in Centralized vs. Decentralized Databank Systems, R-1456-NSF, The Rand Corporation, March 1974.Google ScholarGoogle Scholar
  28. Turn, R., "Privacy Transformations for Databank Systems," AFIPS Conference Proceedings, Vol. 42, 1973 National Computer Conference, AFIPS Press, Montvale, N.J., 1973, pp. 589--601. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Hunt, K., and R. Turn, Privacy and Security in Databank Systems: An Annotated Bibliography, 1969--1973, R-1261-NSF, The Rand Corporation, March 1974.Google ScholarGoogle Scholar
  30. Wulf, W. A., and C. G. Bell, "C.mmp---A Multi-Mini-Processor," Proc. AFIPS FJCC 1972, pp. 765--777. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Dennis, J. B., and E. C. Van Horn, "Programming Semantics for Multiprogrammed Computations," CACM 9, 3 (3/66), pp. 143--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Lampson, B. W., "Dynamic Protection Structures," Proc. AFIPS Conf., Vol. 35, FJCC 1969. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Research in data security: policies and projects

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AFIPS '74: Proceedings of the May 6-10, 1974, national computer conference and exposition
      May 1974
      1083 pages
      ISBN:9781450379205
      DOI:10.1145/1500175

      Copyright © 1974 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 May 1974

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)12
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader