skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 31375 Add to Shopping cart Find in a Library
Title: COMPREHENSIVE SECURITY IN DATA PROCESSING SYSTEMS - THE STATE OF THE ART
Author(s): E GRAPA
Corporate Author: University of Illinois
United States of America
Date Published: 1975
Page Count: 41
Sponsoring Agency: National Institute of Justice/
Rockville, MD 20849
University of Illinois
Urbana, IL 61801
Publication Number: UIUCDCS-R-75-725
Sale Source: National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America
Type: Best Practice/State-of-the-Art Review
Language: English
Country: United States of America
Annotation: THIS PAPER DESCRIBES FIVE TYPES OF SECURITY SYSTEMS BUILT INTO DATA PROCESSING SYSTEMS AND DISCUSSES THEIR ADVANTAGES AND DISADVANTAGES.
Abstract: THE SYSTEMS DESCRIBED ARE AS FOLLOWS: A MULTI-DIMENSIONAL SECURITY PROGRAM FOR A GENERALIZED INFORMATION RETRIEVAL SYSTEM, THE FORMULARY MODEL FOR FLEXIBLE PRIVACY AND ACCESS CONTROLS; THE IMPLEMENTATION OF SECURITY MEASURES IN INFORMATION SYSTEMS; SECURITY CONTROLS IN THE ADEPT-50 TIME-SHARING SYSTEM; AND PROTECTION IN AN INFORMATION PROCESSING UTILITY. THIS STATE-OF-THE-ART REVIEW REVEALS THAT NONE OF THE SYSTEMS OFFERS 'COMPREHENSIVE' SECURITY, BUT RATHER COVER EITHER SECURITY FROM THE FILE UP (OPERATING SYSTEM, MEMORY RESIDUES) OR FROM THE FILE LEVEL DOWN (RECORDS WITHIN A FILE, FIELDS WITHIN A RECORD). THE REQUIREMENTS FOR SUCH A COMPREHENSIVE SYSTEM ARE SUGGESTED. REFERENCES ARE INCLUDED.
Index Term(s): Computer aided operations; Computer privacy and security; Data security; Information processing; Information Systems and Technology
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=31375

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.