Descriptor
Source
Social Work | 1 |
Author
Bergart, Jeffrey G. | 1 |
Hsiao, D. K. | 1 |
Hsiao, David K. | 1 |
Kelley, Verne R. | 1 |
Sawtelle, Thomas K. | 1 |
Weston, Hanna B. | 1 |
Publication Type
Reports - Research | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hsiao, D. K.; And Others – 1974
A description is provided of a conceptual model for a data secure system. The discussion first offers a formal working vocabulary and next, using the intuitive idea of a dichotomy between permissible and impermissible accesses, formalizes the idea with an Extended Logical Data Base and with protection specifications and patterns. These…
Descriptors: Computers, Conceptual Schemes, Confidentiality, Databases
Hsiao, David K. – 1973
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Descriptors: Computer Programs, Computer Storage Devices, Computers, Confidentiality

Kelley, Verne R.; Weston, Hanna B. – Social Work, 1974
Mental health facilities that feed data about their patients into computers should be careful to follow civil liberties standards and those of professional ethics, so that they do not unwittingly contribute to unathorized breaches of privacy. (Authors)
Descriptors: Civil Liberties, Computers, Confidentiality, Ethics
Sawtelle, Thomas K. – 1973
The Air Force Logistics Command (AFLC) is revising and enhancing its data-processing capabilities with the development of a large-scale, multi-site, on-line, integrated data base information system known as the Advanced Logistics System (ALS). A data integrity program is to be built around a Data Base Manager (DBM), an individual or a group of…
Descriptors: Computer Oriented Programs, Computer Programs, Computers, Confidentiality
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science