NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Hsiao, D. K.; And Others – 1974
A description is provided of a conceptual model for a data secure system. The discussion first offers a formal working vocabulary and next, using the intuitive idea of a dichotomy between permissible and impermissible accesses, formalizes the idea with an Extended Logical Data Base and with protection specifications and patterns. These…
Descriptors: Computers, Conceptual Schemes, Confidentiality, Databases
Hsiao, D. K.; And Others – 1974
Although the indispensibility of access control mechanisms in data secure systems has been recognized, there is a need for more subtle protection and refined control mechanisms. This report describes context protection mechanisms which enable the same data unit to be protected differently in different contexts, the differences being determined by…
Descriptors: Computer Programs, Computer Science, Confidentiality, Data Processing
Sutton, Robert – 1974
Privacy is defined and its various social implications discussed in the first part of this paper. The effect of a National Data Center (NDC) and computerized dossiers about people and their past is also considered. It is determined that a computerized information system would present at least four distinct problems to individual identity or…
Descriptors: Computer Storage Devices, Confidentiality, Credibility, Data Processing
Sawtelle, Thomas K. – 1973
The Air Force Logistics Command (AFLC) is revising and enhancing its data-processing capabilities with the development of a large-scale, multi-site, on-line, integrated data base information system known as the Advanced Logistics System (ALS). A data integrity program is to be built around a Data Base Manager (DBM), an individual or a group of…
Descriptors: Computer Oriented Programs, Computer Programs, Computers, Confidentiality
Boruch, Robert F. – 1971
This report examines a series of general models that represent the process of merging records from separate files when it becomes essential to inhibit identifiability of records in at least one of the files. Models are illustrated symbolically by flow diagrams, and examples of each variation are taken from the social sciences. These variations…
Descriptors: Administrative Principles, Confidential Records, Confidentiality, Data Processing
Gaus, Wilhelm, Ed.; Henzler, Rolf, Ed. – 1977
The 13 papers collected here were presented at the Workshop on Data Documentation held at Reisenburg Castle, Federal Republic of Germany, in July 1975. This workshop was a first attempt to identify some of the problems in the field of data documentation, formulate them, and solve them as far as possible. The subject was approached from four…
Descriptors: Chemistry, Computer Oriented Programs, Confidentiality, Data
Everett, Bruce E. – 1977
Current regulations and guidelines established by the Department of Health, Education and Welfare for the maintenance of confidentiality in educational research are summarized. Key terms, such as "system of records" are defined and elaborated upon. The responsibilities of the funding agency and its research contractors are enumerated and…
Descriptors: Administrative Agencies, Agency Role, Civil Liberties, Computer Storage Devices
Seipp, David J. – 1975
Concern is growing over the problems of freedom of information, individual right to privacy, and automated recordkeeping systems. As a guide to policy considerations for overview and for detail, this extensive structured bibliography of privacy and disclosure literature adopts a topical scheme, dividing the subject first into governmental and…
Descriptors: Bibliographies, Civil Rights, Computer Science, Confidential Records