skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 89655 Find in a Library
Title: Data Security and Data Processing, Volume 5 - Study Results TRW (Thompson Ramo Wooldridge, Inc) Systems
Corporate Author: IBM
Data Processing Division
United States of America
Date Published: 1974
Page Count: 311
Sponsoring Agency: IBM
White Plains, NY 10604
Publication Number: G320-1375-0
Format: Document
Language: English
Country: United States of America
Annotation: This report presents several papers studying computer system security technology, threats and vulnerabilities in a computer system, requirements for secure operating systems, issues of secure computer system certification, and automated aids for secure systems.
Abstract: The papers address methods for assuring computer system security by considering basic elements of protection (i.e., isolation, controlled access, and identification) and issues involved in certifying a system as secure (i.e., semantic, technological, and administrative). They review design approaches available to achieve these elements of protection and discuss problems involved in failure testing. One paper reviews security considerations for computer hardware and software and illustrates major weaknesses in contemporary operating systems. Security threats and security verification techniques are described. The papers suggest that better system design would be helpful in testing and verifying systems. Future efforts in this area should be spent on model development, production methodology, and automated test tools. Diagrams, tables, and chapter references are supplied. For individual papers, see NCJ 89656-60.
Index Term(s): Computer crime prevention measures; Computer hardware systems; Computer privacy and security; Computer program models; Computer software; Testing and measurement; Threat assessment
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=89655

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.