Descriptor
Confidentiality | 2 |
Databases | 2 |
Information Storage | 2 |
Computer Programs | 1 |
Computer Science | 1 |
Computers | 1 |
Conceptual Schemes | 1 |
Data Processing | 1 |
Information Retrieval | 1 |
Input Output Devices | 1 |
Models | 1 |
More ▼ |
Source
Author
Hsiao, D. K. | 2 |
Publication Type
Reports - Research | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hsiao, D. K.; And Others – 1974
A description is provided of a conceptual model for a data secure system. The discussion first offers a formal working vocabulary and next, using the intuitive idea of a dichotomy between permissible and impermissible accesses, formalizes the idea with an Extended Logical Data Base and with protection specifications and patterns. These…
Descriptors: Computers, Conceptual Schemes, Confidentiality, Databases
Hsiao, D. K.; And Others – 1974
Although the indispensibility of access control mechanisms in data secure systems has been recognized, there is a need for more subtle protection and refined control mechanisms. This report describes context protection mechanisms which enable the same data unit to be protected differently in different contexts, the differences being determined by…
Descriptors: Computer Programs, Computer Science, Confidentiality, Data Processing