Computer security and the bell system.

نویسنده

  • R Morris
چکیده

BOOK REVIEWS Arthur Canfield Upton: New Director of the NCI. China After Mao: Science Seeks to Be Both Red and Expert ........... IEEE: A Policy Challenge for Big Engineering Society . Photosynthetic Solar Energy: Rediscovering Biomass Fuels ............ Cryptography: On the Brink of a Revolution?. Call for Contributed Papers: A. Herschman; Instructions for Contributors. Two Centuries ofAmerican Medicine and Advances in American Medicine, reviewed by G. G. Reader; The First Three Minutes, D. W. Sciama; Solid State Physics, H. Ehrenreich; Metallurgical Remains ofAncient China, K. C. Chang; Books Received and Book Order Service. REPORTS Detection ofLyman a Emission from the Saturnian Disk and from the Ring System: H. Weiser, R. C. Vitz, H. W. Moos....................... 716

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

About Security Models

A method for evaluating security models is developed and applied to the model of Bell and LaPadula. The method shows the inadequacy of the Bell and LaPadula model, in particular,and the impossibilityof any adequate definitionof a secure system based solely on the notion of a secure state. The implications for the fruitfulnessof seeking a global definition of a secure system and for the state of...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

A Security Model for Military Message Systems: Retrospective

2 Military systems that process classified information must operate in a secure manner; that is, they must adequately protect information against unauthorized disclosure, modification, and withholding. A goal of current research in computer security is to facilitate the construction of multilevel secure systems, systems that protect information of different classifications from users with diffe...

متن کامل

Information Security – Bell-La Padula Model

Before the Bell-La Padula model in the late 1960’s, developments in commercial operating systems suggested the possibility of tremendous cost savings. Timesharing was starting to provide commercial customers the ability to share the leasing costs of IBM and other big-iron computers through simultaneous or sequential use of the expensive mainframe computers. For those in classified government ci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Science

دوره 197 4305  شماره 

صفحات  -

تاریخ انتشار 1977