Collection
Degree Department
Year
1 Matching Results
Results open in a new window/tab.
Results:
1 - 1 of
1
A Report on Control of Access to Stored Information in a Computer Utility
Time-sharing computer systems permit large numbers of users to operate on common sets of data and programs. Since certain parts of these computer resources may be sensitive or proprietary, there exists the risks that information belonging to one user, may, contrary to his intent, become available to other users, and there is the additional risk that outside agencies may infiltrate the system and obtain information. The question naturally arises of protecting one user's stored program and data against unauthorized access by others.
Date:
1978
Creator:
Shakiba-Jahromi, Mostafa
System:
The UNT Digital Library