{"title":"保护电脑系统内的资料","authors":"Jerome H. Saltier, Michael P. Schroeder","doi":"10.1109/CSIT.1975.6498831","DOIUrl":null,"url":null,"abstract":"The topics of protection of information, data security, and privacy In the domain of Computer systems are of particular significance in our society, which is increasingly keeping its records in computer based systems. This paper is an excellant technical survey of the mechanics of protecting computer-stored information from unauthorised use or modifications, with a focus on tire conceptual framework necessary tu enforce data security.","PeriodicalId":231350,"journal":{"name":"IEEE CSIT Newsletter","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1975-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"94","resultStr":"{\"title\":\"Protection of information in computer systems\",\"authors\":\"Jerome H. Saltier, Michael P. Schroeder\",\"doi\":\"10.1109/CSIT.1975.6498831\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The topics of protection of information, data security, and privacy In the domain of Computer systems are of particular significance in our society, which is increasingly keeping its records in computer based systems. This paper is an excellant technical survey of the mechanics of protecting computer-stored information from unauthorised use or modifications, with a focus on tire conceptual framework necessary tu enforce data security.\",\"PeriodicalId\":231350,\"journal\":{\"name\":\"IEEE CSIT Newsletter\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1975-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"94\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE CSIT Newsletter\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSIT.1975.6498831\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE CSIT Newsletter","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSIT.1975.6498831","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The topics of protection of information, data security, and privacy In the domain of Computer systems are of particular significance in our society, which is increasingly keeping its records in computer based systems. This paper is an excellant technical survey of the mechanics of protecting computer-stored information from unauthorised use or modifications, with a focus on tire conceptual framework necessary tu enforce data security.