{"title":"Distributed processing systems security: Communications, computer, or both","authors":"P. Woodie","doi":"10.1109/ICDE.1986.7266271","DOIUrl":null,"url":null,"abstract":"Information security involves many components, including communication security, computer security, physical security, and personnel security. This paper deals only with communication and computer security. In systems that involve either communications systems or monolithic computer systems (but not both) the overall requirements for information security are relatively straightforward, or at least relatively well understood. However, in distributed processing systems that usually involve both communications and computer components, there is a need for both communications as well as computer security techniques. This paper addresses communications security, computer security, and their relationship in information protection in the distributed processing environment.","PeriodicalId":415748,"journal":{"name":"1986 IEEE Second International Conference on Data Engineering","volume":"253 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1986-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1986 IEEE Second International Conference on Data Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDE.1986.7266271","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Information security involves many components, including communication security, computer security, physical security, and personnel security. This paper deals only with communication and computer security. In systems that involve either communications systems or monolithic computer systems (but not both) the overall requirements for information security are relatively straightforward, or at least relatively well understood. However, in distributed processing systems that usually involve both communications and computer components, there is a need for both communications as well as computer security techniques. This paper addresses communications security, computer security, and their relationship in information protection in the distributed processing environment.