{"title":"“tsupdood ?为您和MMI[安全]重新打包问题","authors":"R. Bace, M. Schaefer","doi":"10.1109/NSPW.1995.492338","DOIUrl":null,"url":null,"abstract":"Changes in computer usage have significantly changed the so-called computer security, network security and information security problems. The changes are largely due to the rapid proliferation and interconnection of computers and the associated distribution of software. Of concern is the uncontrolled nature of this activity: systems and workstations are often interconnected without notice being given to all of the affected parties. The result has been increased user perception of breaches in \"security\", especially in the form of computer takeover, data destruction, or service denial by virus, worm or trapdoor. It is expected that consciousness of these problems, and of confidentiality compromises, will increase in the coming months. It is posited that a principal cause of the problem is willful promiscuity and a pronounced lack of mutual suspicion. The separation kernel concept is revisited as a potential practical means of improving security protections consistent with preserving the use of legacy systems and of commercial products.","PeriodicalId":111230,"journal":{"name":"Proceedings of 1995 New Security Paradigms Workshop","volume":"2020 17","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1995-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"'tsupdood? Repackaged problems for you and MMI [security]\",\"authors\":\"R. Bace, M. Schaefer\",\"doi\":\"10.1109/NSPW.1995.492338\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Changes in computer usage have significantly changed the so-called computer security, network security and information security problems. The changes are largely due to the rapid proliferation and interconnection of computers and the associated distribution of software. Of concern is the uncontrolled nature of this activity: systems and workstations are often interconnected without notice being given to all of the affected parties. The result has been increased user perception of breaches in \\\"security\\\", especially in the form of computer takeover, data destruction, or service denial by virus, worm or trapdoor. It is expected that consciousness of these problems, and of confidentiality compromises, will increase in the coming months. It is posited that a principal cause of the problem is willful promiscuity and a pronounced lack of mutual suspicion. The separation kernel concept is revisited as a potential practical means of improving security protections consistent with preserving the use of legacy systems and of commercial products.\",\"PeriodicalId\":111230,\"journal\":{\"name\":\"Proceedings of 1995 New Security Paradigms Workshop\",\"volume\":\"2020 17\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1995-08-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 1995 New Security Paradigms Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NSPW.1995.492338\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 1995 New Security Paradigms Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NSPW.1995.492338","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
'tsupdood? Repackaged problems for you and MMI [security]
Changes in computer usage have significantly changed the so-called computer security, network security and information security problems. The changes are largely due to the rapid proliferation and interconnection of computers and the associated distribution of software. Of concern is the uncontrolled nature of this activity: systems and workstations are often interconnected without notice being given to all of the affected parties. The result has been increased user perception of breaches in "security", especially in the form of computer takeover, data destruction, or service denial by virus, worm or trapdoor. It is expected that consciousness of these problems, and of confidentiality compromises, will increase in the coming months. It is posited that a principal cause of the problem is willful promiscuity and a pronounced lack of mutual suspicion. The separation kernel concept is revisited as a potential practical means of improving security protections consistent with preserving the use of legacy systems and of commercial products.