Privacy and Security of Data Communications and Data Bases.
David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick:
Privacy and Security of Data Communications and Data Bases.
VLDB 1978: 55-67@inproceedings{DBLP:conf/vldb/HsiaoKM78,
author = {David K. Hsiao and
Douglas S. Kerr and
Stuart E. Madnick},
editor = {S. Bing Yao},
title = {Privacy and Security of Data Communications and Data Bases},
booktitle = {Fourth International Conference on Very Large Data Bases, September
13-15, 1978, West Berlin, Germany},
publisher = {IEEE Computer Society},
year = {1978},
pages = {55-67},
ee = {db/conf/vldb/HsiaoKM78.html},
crossref = {DBLP:conf/vldb/78},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Abstract
Computer security deals with the managerial
procedures and technological safeguards applied to
computer hardware, software, and data to assure
against accidental or deliberate unauthorized access to and the dissemination of computer system
data. Computer privacy, on the other hand, is concerned with the moral and legal requirements to
protect data from unauthorized access and dissemination. The issues involved in computer privacy are
therefore political decisions regarding who may
have access to what and who may disseminate what,
whereas the issues involved in computer security
are procedures and safeguards for enforcing the
privacy decisions. The motivations for security
and privacy can be found in the desire for secrecy
in military affairs, for nondisclosure in industrial applications, and for information-sharing in
modern society. These motivations have become particularly acute where computers are used since computers play a major and important role in processing and storing of information. This paper discusses computer privacy and data security. Other
issues such as operational security, physical
security, hardware security, and operating system
security are discussed in [1,2,3] and will not be
included here.
Copyright © 1978 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
Printed Edition
S. Bing Yao (Ed.):
Fourth International Conference on Very Large Data Bases, September 13-15, 1978, West Berlin, Germany.
IEEE Computer Society 1978
Contents
References
- [1]
- ...
- [2]
- ...
- [3]
- ...
- [4]
- ...
- [5]
- Theodore A. Linden:
Operating System Structures to Support Security and Reliable Software.
ACM Comput. Surv. 8(4): 409-445(1976)
- [6]
- ...
- [7]
- ...
- [8]
- ...
- [9]
- ...
- [10]
- ...
- [11]
- ...
- [12]
- ...
- [13]
- ...
- [14]
- ...
- [15]
- ...
- [16]
- ...
- [17]
- ...
- [18]
- ...
- [19]
- H. Rex Hartson, David K. Hsiao:
A Semantic Model for Data Base Protection Languages.
VLDB 1976: 27-42
- [20]
- David K. Hsiao, Richard I. Baum:
Information Secure Systems.
Advances in Computers 14: 231-272(1976)
- [21]
- John B. Kam, Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10(1977)
- [22]
- Clement T. Yu, Francis Y. L. Chin:
A Study on the Protection of Statistical Data Bases.
SIGMOD Conference 1977: 169-181
- [23]
- ...
- [24]
- ...
- [25]
- Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976)
- [26]
- ...
- [27]
- ...
- [28]
- Michael Stonebraker:
Implementation of Integrity Constraints and Views by Query Modification.
SIGMOD Conference 1975: 65-78
- [29]
- ...
- [30]
- ...
- [31]
- Eduardo B. Fernández, Rita C. Summers, Tomás Lang:
Definition and Evaluation of Access Rules in Data Management Systems.
VLDB 1975: 268-285
- [32]
- John Miles Smith, Diane C. P. Smith:
Database Abstractions: Aggregation.
Commun. ACM 20(6): 405-413(1977)
- [33]
- John Miles Smith, Diane C. P. Smith:
Database Abstractions: Aggregation and Generalization.
ACM Trans. Database Syst. 2(2): 105-133(1977)
- [34]
- ...
- [35]
- ...
- [37]
- ...
- [38]
- ...
- [39]
- ...
- [40]
- ...
- [41]
- ...
- [42]
- Theodore D. Friedman, Lance J. Hoffman:
Execution Time Requirements for Encipherment Programs.
Commun. ACM 17(8): 445-449(1974)
- [43]
- ...
- [44]
- ...
- [45]
- ...
- [46]
- Rudolf Bayer, J. K. Metzger:
On the Encipherment of Search Trees and Random Access Files.
ACM Trans. Database Syst. 1(1): 37-52(1976)
- [47]
- ...
- [48]
- ...
- [49]
- ...
- [50]
- ...
- [51]
- ...
- [52]
- ...
Copyright © Tue Mar 16 02:21:55 2010
by Michael Ley (ley@uni-trier.de)