A Report on Control of Access to Stored Information in a Computer Utility
Description:
Time-sharing computer systems permit large numbers of users to operate on common sets of data and programs. Since certain parts of these computer resources may be sensitive or proprietary, there exists the risks that information belonging to one user, may, contrary to his intent, become available to other users, and there is the additional risk that outside agencies may infiltrate the system and obtain information. The question naturally arises of protecting one user's stored program and data a…
more
Date:
1978
Creator:
Shakiba-Jahromi, Mostafa