ABSTRACT
This session will begin with presentations and a panel discussion by representatives of various governmental agencies involved with research or funding of research in data security. They will present their views on the policies and goals of federally funded research in the area of data security and how this relates to privately funded research and development in this and related areas. They will also have the opportunity to point out new directions which should be pursued. There will be discussion on both the technological and social impact of such funding.
- Friedman, T. D. and L. J. Hoffman, Execution Time Requirements for Encipherment Programs, University of California Electronics Research Laboratory Memo ERL-M378, June 1, 1973. To appear, Communications of the ACM. Google ScholarDigital Library
- Woodward, F. G. and L. J. Hoffman, Worst-case Costs for Dynamic Data Element Security Decisions, University of California Electronics Research Laboratory Memo ERL-M413, September 26, 1973.Google Scholar
- Hoffman, L. J., "The Formulary Model for Access Control," Proc. AFIPS 1971 FJCC, Vol. 39, AFIPS Press, pp. 587--601.Google Scholar
- Bell, D. E. and L. J. LaPadula, Secure Computer Systems: Mathematical Foundations, ESD-TR-73-278, USAF Electronic Systems Division, L. G. Hanscom Field, Bedford, Mass.Google Scholar
- Baskin, H. B., B. R. Borgerson, and R. Roberts, "PRIME---A Modular Architecture for Terminal-Oriented Systems," Proc. AFIPS 1972 SJCC, pp. 431--437. Google ScholarDigital Library
- Hsiao, D. K., "Access Control in An On-Line File System," Working Papers of FILE68---International Seminar on File Organization by I.F.I.P. (I.A.G.) Administrative Data Processing Group, Copenhagen, Denmark, Nov. 1968. The same paper is also included in a book entitled File Organization---Selected Papers from FILE68, an I.A.G. Conference by Studentlitteratur Ab, Lund, Sweden.Google Scholar
- Hsiao, David K., "Logical Access Control Mechanisms in Computer Systems," Proceedings of Conference on Secure Data Sharing, ONR/NSRDC, Washington, D.C., July 1973.Google Scholar
- Bergart, J. G., M. Denicoff, and D. K. Hsiao, An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control on Computer Systems, Technical Report OSU-CISRC-TR-72-12, The Department of Computer and Information Science, The Ohio State University, November 1972.Google Scholar
- McCauley, E. J., III, and D. K. Hsiao, A Model for Data Secure Systems, Technical Report OSU-CISRC-TR-73-8, The Department of Computer and Information Science, The Ohio State University, February 1974.Google Scholar
- Nee, C. J., and D. K. Hsiao, Theoretical Foundations for Context Protection and Consistent Control in Data Secure Systems, Technical Report OSU-CISRC-TR-73-9, The Department of Computer and Information Science, The Ohio State University, February 1974.Google Scholar
- Baum, R. I., and D. K. Hsiao, A Data Secure Computer Architecture, Technical Report OSU-CISRC-TR-73-10, The Department of Computer and Information Science, The Ohio State University, March 1974.Google Scholar
- Hsiao, D. K., and T. Wyrick, System Configuration Study on the Interconnection of the IBM 370/165, DEC System-10 and Micro 1600/21 Computer Systems, Technical Report OSU-CISRC-TR-73-7, The Department of Computer and Information Science and the Instruction and Research Computer Center, The Ohio State University, October 1973.Google Scholar
- Hsiao, D. K., et al., The PL / X Compiler-Subsystem Writers' Manual, The Instruction and Research Computer Center and The Department of Computer and Information Science, The Ohio State University, August 1973.Google Scholar
- Hsiao, D. K., et al., The PL / X Programming Language Reference Manual, The Instruction and Research Computer Center and The Department of Computer and Information Science, The Ohio State University, August 1973.Google Scholar
- Hsiao, D. K., et al., The PL / X Compiler Program Statements, Technical Report OSU-CISRC-TR-73-11, issued jointly by the IRCC and The Department of Computer and Information Science, The Ohio State University, December 1973.Google Scholar
- Cohen, E. I., D. K. Hsiao, and F. A. Stahl, Distributed Secure Data Bases in Computer Networks, Technical Report OSU-CISRC-TR-73-11, The Department of Computer and Information Science, The Ohio State University, February 1974.Google Scholar
- Stahl, F. A., "A Homophonic Cipher for Computational Security, Proceedings of the AFIPS National Computer Conference and Exposition, Vol. 42, AFIPS Press, Montvale, N.J., 1973, pp. 565--8. Google ScholarDigital Library
- Stahl, F. A., On Computational Security, Report R-637, Coordinated Science Laboratory, University of Illinois, Urbana, Illinois, January 1974.Google Scholar
- Turn, R., and N. Z. Shapiro, "Privacy and Security in Databank Systems: Measures of Effectiveness, Costs, and Protector-Intruder Interactions," AFIPS Conference Proceedings, Vol. 41, Part 1, 1972 Fall Joint Computer Conference, AFIPS Press, Montvale, N.J., 1972, pp. 435--444. Google ScholarDigital Library
- Coates, J. F., Computers and Privacy: Is There a Missing Theorem? Note N-680 (R), Institute for Defense Analysis, Arlington, Va., April 1970.Google Scholar
- Shapiro, N. Z., and M. Davis, Uncrackable Databanks, R-1382-NSF, The Rand Corporation, December 1973.Google Scholar
- Reed, I. S., The Application of Information Theory to Privacy in Databanks, R-1282, The Rand Corporation, May 1973.Google Scholar
- Reed, I. S., "Information Theory and Privacy in Databanks," AFIPS Conference Proceedings, Vol. 42, 1973 National Computer Conference, AFIPS Press, Montvale, N.J., 1973, pp. 581--587. Google ScholarDigital Library
- Johnson, S. M., Certain Number-Theoretic Aspects of Access Control Passwords, R-1433-NSF, The Rand Corporation, March 1974.Google Scholar
- Turn, R., Privacy and Security in Personal Information Databank Systems, R-1044-NSF, The Rand Corporation, March 1974.Google Scholar
- Turn, R., Toward Data Security Engineering, P-5142, January 1974.Google Scholar
- Shapiro, N. Z., M. L. Juncosa, and R. Turn, Privacy and Security in Centralized vs. Decentralized Databank Systems, R-1456-NSF, The Rand Corporation, March 1974.Google Scholar
- Turn, R., "Privacy Transformations for Databank Systems," AFIPS Conference Proceedings, Vol. 42, 1973 National Computer Conference, AFIPS Press, Montvale, N.J., 1973, pp. 589--601. Google ScholarDigital Library
- Hunt, K., and R. Turn, Privacy and Security in Databank Systems: An Annotated Bibliography, 1969--1973, R-1261-NSF, The Rand Corporation, March 1974.Google Scholar
- Wulf, W. A., and C. G. Bell, "C.mmp---A Multi-Mini-Processor," Proc. AFIPS FJCC 1972, pp. 765--777. Google ScholarDigital Library
- Dennis, J. B., and E. C. Van Horn, "Programming Semantics for Multiprogrammed Computations," CACM 9, 3 (3/66), pp. 143--155. Google ScholarDigital Library
- Lampson, B. W., "Dynamic Protection Structures," Proc. AFIPS Conf., Vol. 35, FJCC 1969. Google ScholarDigital Library
- Research in data security: policies and projects
Recommendations
Analysis and Research of Informatization Promoting Rural Social Security
BCGIN '13: Proceedings of the 2013 International Conference on Business Computing and Global InformatizationThis paper analyzes the relationship between rural informatization and the rural social security for empirical research: first of all, we have developed an evaluation index system of rural imformatization and rural social security, with which we ...
ICT Research in Africa: Need for a Strategic Developmental Focus
This paper argues the need to expand the research agenda on the use of ICT in African countries to include a stronger strategic developmental focus than is evident in much of the literature to date. Four strategic dimensions are identified, where ICT ...
Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences
The revolution in information technology that began in the 1990s has been transforming Finland into an information society. Imaginative data processing and utilization, arising from the needs of citizens and the business community, are some of the most ...
Comments