Accession Number : AD0787580

Title :   A Data Secure Computer Architecture. Part I.

Descriptive Note : Technical rept.,

Corporate Author : OHIO STATE UNIV COLUMBUS COMPUTER AND INFORMATION SCIENCE RESEARCH CENTER

Personal Author(s) : Baum,Richard I. ; Hsiao,David K.

Report Date : JUL 1974

Pagination or Media Count : 31

Abstract : A simple data model based on semantic connections is used as a vehicle to elaborate on protection enforcement mechanisms in the data secure computer. Two types of protection enforcement mechanisms are introduced: concealment protection enforcement and information-theoretic enforcement. A concealment enforcement mechanism protects information by selectivity preventing user access to certain data items. An information-theoretic enforcement mechanism prevents the probability that a user knows of the existence of a data item from exceeding a threshold. (Modified author abstract)

Descriptors :   *Data processing security, Data bases, Computer architecture, Protection, Information theory, Semantics

Subject Categories : Computer Hardware
      Computer Systems Management and Standards

Distribution Statement : APPROVED FOR PUBLIC RELEASE