{"title":"数据库系统中的隐私和安全:有效性、成本和保护者-入侵者交互的度量","authors":"R. Turn, N. Shapiro","doi":"10.1145/1479992.1480052","DOIUrl":null,"url":null,"abstract":"The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification. However, systematic procedures for cost-effective implementation of these safeguards are still lacking.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":"{\"title\":\"Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions\",\"authors\":\"R. Turn, N. Shapiro\",\"doi\":\"10.1145/1479992.1480052\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification. However, systematic procedures for cost-effective implementation of these safeguards are still lacking.\",\"PeriodicalId\":262093,\"journal\":{\"name\":\"AFIPS '72 (Fall, part I)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1972-12-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"24\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AFIPS '72 (Fall, part I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1479992.1480052\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AFIPS '72 (Fall, part I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1479992.1480052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions
The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification. However, systematic procedures for cost-effective implementation of these safeguards are still lacking.