J. J. Pottmyer, Ken Fong, S. Thompson, Ralph Shattuck
{"title":"系统设计中的安全考虑","authors":"J. J. Pottmyer, Ken Fong, S. Thompson, Ralph Shattuck","doi":"10.1145/800171.809642","DOIUrl":null,"url":null,"abstract":"This session addresses today's design efforts, seeking to identify security issues for fifth generation computing. Emphasis is placed on disaster recovery, auditing and evaluation of computer systems, and special problems arising from the proliferation of small computers.\n K. Fong, whose abstract follows in these Proceedings, describes our changing approach to providing uninterruptable access to automated information resources. These changes can include total redundancy and geographic dispersion, ensuring compatibility and transportability of information and software, as well as automated facilities to recover essential functions after disasters.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"809 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security considerations in system design\",\"authors\":\"J. J. Pottmyer, Ken Fong, S. Thompson, Ralph Shattuck\",\"doi\":\"10.1145/800171.809642\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This session addresses today's design efforts, seeking to identify security issues for fifth generation computing. Emphasis is placed on disaster recovery, auditing and evaluation of computer systems, and special problems arising from the proliferation of small computers.\\n K. Fong, whose abstract follows in these Proceedings, describes our changing approach to providing uninterruptable access to automated information resources. These changes can include total redundancy and geographic dispersion, ensuring compatibility and transportability of information and software, as well as automated facilities to recover essential functions after disasters.\",\"PeriodicalId\":218138,\"journal\":{\"name\":\"ACM '84\",\"volume\":\"809 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM '84\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/800171.809642\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '84","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800171.809642","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This session addresses today's design efforts, seeking to identify security issues for fifth generation computing. Emphasis is placed on disaster recovery, auditing and evaluation of computer systems, and special problems arising from the proliferation of small computers.
K. Fong, whose abstract follows in these Proceedings, describes our changing approach to providing uninterruptable access to automated information resources. These changes can include total redundancy and geographic dispersion, ensuring compatibility and transportability of information and software, as well as automated facilities to recover essential functions after disasters.