{"title":"分布式软件中的安全问题","authors":"R. Kemmerer","doi":"10.1145/267895.267902","DOIUrl":null,"url":null,"abstract":"As more business activities are being automated and an increasing number of computers are being used to store vital and sensitive information the need for secure computer systems becomes more apparent. This need is even more apparent as the systems and applications are being distributed and access is via an insecure network. The security of these systems can be achieved only through systematic design; they can not be achieved through haphazard seat-of-the-pants methods.","PeriodicalId":297962,"journal":{"name":"ESEC '97/FSE-5","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Security issues in distributed software\",\"authors\":\"R. Kemmerer\",\"doi\":\"10.1145/267895.267902\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As more business activities are being automated and an increasing number of computers are being used to store vital and sensitive information the need for secure computer systems becomes more apparent. This need is even more apparent as the systems and applications are being distributed and access is via an insecure network. The security of these systems can be achieved only through systematic design; they can not be achieved through haphazard seat-of-the-pants methods.\",\"PeriodicalId\":297962,\"journal\":{\"name\":\"ESEC '97/FSE-5\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ESEC '97/FSE-5\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/267895.267902\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ESEC '97/FSE-5","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/267895.267902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
As more business activities are being automated and an increasing number of computers are being used to store vital and sensitive information the need for secure computer systems becomes more apparent. This need is even more apparent as the systems and applications are being distributed and access is via an insecure network. The security of these systems can be achieved only through systematic design; they can not be achieved through haphazard seat-of-the-pants methods.