J. J. Pottmyer, Ken Fong, S. Thompson, Ralph Shattuck
{"title":"Security considerations in system design","authors":"J. J. Pottmyer, Ken Fong, S. Thompson, Ralph Shattuck","doi":"10.1145/800171.809642","DOIUrl":null,"url":null,"abstract":"This session addresses today's design efforts, seeking to identify security issues for fifth generation computing. Emphasis is placed on disaster recovery, auditing and evaluation of computer systems, and special problems arising from the proliferation of small computers.\n K. Fong, whose abstract follows in these Proceedings, describes our changing approach to providing uninterruptable access to automated information resources. These changes can include total redundancy and geographic dispersion, ensuring compatibility and transportability of information and software, as well as automated facilities to recover essential functions after disasters.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"809 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '84","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800171.809642","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This session addresses today's design efforts, seeking to identify security issues for fifth generation computing. Emphasis is placed on disaster recovery, auditing and evaluation of computer systems, and special problems arising from the proliferation of small computers.
K. Fong, whose abstract follows in these Proceedings, describes our changing approach to providing uninterruptable access to automated information resources. These changes can include total redundancy and geographic dispersion, ensuring compatibility and transportability of information and software, as well as automated facilities to recover essential functions after disasters.