ACM SIGMOD Anthology VLDB dblp.uni-trier.de

Privacy and Security of Data Communications and Data Bases.

David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick: Privacy and Security of Data Communications and Data Bases. VLDB 1978: 55-67
@inproceedings{DBLP:conf/vldb/HsiaoKM78,
  author    = {David K. Hsiao and
               Douglas S. Kerr and
               Stuart E. Madnick},
  editor    = {S. Bing Yao},
  title     = {Privacy and Security of Data Communications and Data Bases},
  booktitle = {Fourth International Conference on Very Large Data Bases, September
               13-15, 1978, West Berlin, Germany},
  publisher = {IEEE Computer Society},
  year      = {1978},
  pages     = {55-67},
  ee        = {db/conf/vldb/HsiaoKM78.html},
  crossref  = {DBLP:conf/vldb/78},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

Abstract

Computer security deals with the managerial procedures and technological safeguards applied to computer hardware, software, and data to assure against accidental or deliberate unauthorized access to and the dissemination of computer system data. Computer privacy, on the other hand, is concerned with the moral and legal requirements to protect data from unauthorized access and dissemination. The issues involved in computer privacy are therefore political decisions regarding who may have access to what and who may disseminate what, whereas the issues involved in computer security are procedures and safeguards for enforcing the privacy decisions. The motivations for security and privacy can be found in the desire for secrecy in military affairs, for nondisclosure in industrial applications, and for information-sharing in modern society. These motivations have become particularly acute where computers are used since computers play a major and important role in processing and storing of information. This paper discusses computer privacy and data security. Other issues such as operational security, physical security, hardware security, and operating system security are discussed in [1,2,3] and will not be included here.

Copyright © 1978 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...

Printed Edition

S. Bing Yao (Ed.): Fourth International Conference on Very Large Data Bases, September 13-15, 1978, West Berlin, Germany. IEEE Computer Society 1978
Contents CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML

References

[1]
...
[2]
...
[3]
...
[4]
...
[5]
Theodore A. Linden: Operating System Structures to Support Security and Reliable Software. ACM Comput. Surv. 8(4): 409-445(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[6]
...
[7]
...
[8]
...
[9]
...
[10]
...
[11]
...
[12]
...
[13]
...
[14]
...
[15]
...
[16]
...
[17]
...
[18]
...
[19]
H. Rex Hartson, David K. Hsiao: A Semantic Model for Data Base Protection Languages. VLDB 1976: 27-42 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[20]
David K. Hsiao, Richard I. Baum: Information Secure Systems. Advances in Computers 14: 231-272(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[21]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[22]
Clement T. Yu, Francis Y. L. Chin: A Study on the Protection of Statistical Data Bases. SIGMOD Conference 1977: 169-181 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[23]
...
[24]
...
[25]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[26]
...
[27]
...
[28]
Michael Stonebraker: Implementation of Integrity Constraints and Views by Query Modification. SIGMOD Conference 1975: 65-78 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[29]
...
[30]
...
[31]
Eduardo B. Fernández, Rita C. Summers, Tomás Lang: Definition and Evaluation of Access Rules in Data Management Systems. VLDB 1975: 268-285 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[32]
John Miles Smith, Diane C. P. Smith: Database Abstractions: Aggregation. Commun. ACM 20(6): 405-413(1977) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[33]
John Miles Smith, Diane C. P. Smith: Database Abstractions: Aggregation and Generalization. ACM Trans. Database Syst. 2(2): 105-133(1977) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[34]
...
[35]
...
[37]
...
[38]
...
[39]
...
[40]
...
[41]
...
[42]
Theodore D. Friedman, Lance J. Hoffman: Execution Time Requirements for Encipherment Programs. Commun. ACM 17(8): 445-449(1974) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[43]
...
[44]
...
[45]
...
[46]
Rudolf Bayer, J. K. Metzger: On the Encipherment of Search Trees and Random Access Files. ACM Trans. Database Syst. 1(1): 37-52(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[47]
...
[48]
...
[49]
...
[50]
...
[51]
...
[52]
...

Copyright © Tue Mar 16 02:21:55 2010 by Michael Ley (ley@uni-trier.de)