A Report on Control of Access to Stored Information in a Computer Utility (open access)

A Report on Control of Access to Stored Information in a Computer Utility

Time-sharing computer systems permit large numbers of users to operate on common sets of data and programs. Since certain parts of these computer resources may be sensitive or proprietary, there exists the risks that information belonging to one user, may, contrary to his intent, become available to other users, and there is the additional risk that outside agencies may infiltrate the system and obtain information. The question naturally arises of protecting one user's stored program and data against unauthorized access by others.
Date: 1978
Creator: Shakiba-Jahromi, Mostafa
System: The UNT Digital Library