New thinking about information technology security
نویسندگان
چکیده
This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the “divide and conquer” approach to achieving protection, understandability, and flexibility, the result is a more flexible solution than the rigid hierarchical organization identified in the Trusted Database Interpretation or the partitioning introduced in the Trusted Network Interpretation.
منابع مشابه
A new security proof for FMNV continuous non-malleable encoding scheme
A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملOECD 'Guidelines for the Security of Information Systems"
These Guidelines apply to all participants in the new information society and suggest the need for a greater awareness and understanding of security issues, including the need to develop a "culture of security" – that is, a focus on security in the development of information systems and networks, and the adoption of new ways of thinking and behaving when using and interacting within information...
متن کاملبررسی موانع مؤثر بر تحقق دورکاری در کشور
Increasing spread of information and communication technology and the deep impact of it on all aspects of society, including jobs and careers, have led to the emergence of teleworking. Teleworking has been deployed in most of the developed countries, and has created a significant added value for their societies therefore, developing countries must prepare themselves for teleworking and its vari...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 14 شماره
صفحات -
تاریخ انتشار 1995