A Report on Control of Access to Stored Information in a Computer Utility (open access)

A Report on Control of Access to Stored Information in a Computer Utility

Time-sharing computer systems permit large numbers of users to operate on common sets of data and programs. Since certain parts of these computer resources may be sensitive or proprietary, there exists the risks that information belonging to one user, may, contrary to his intent, become available to other users, and there is the additional risk that outside agencies may infiltrate the system and obtain information. The question naturally arises of protecting one user's stored program and data against unauthorized access by others.
Date: 1978
Creator: Shakiba-Jahromi, Mostafa
System: The UNT Digital Library
A Top-Down Structured Programming Technique for Mini-Computers (open access)

A Top-Down Structured Programming Technique for Mini-Computers

This paper reviews numerous theoretical results on control structures and demonstrates their practical examples. This study deals with the design of run-time support routines by using top-down structured programming technique. A number of examples are given as illustration of this method. In conclusion, structured programming has proved to be an important methodology for systematic program design and development.
Date: May 1978
Creator: Wu, Chin-yi Robert
System: The UNT Digital Library