Accession Number : AD0787580
Title : A Data Secure Computer Architecture. Part I.
Descriptive Note : Technical rept.,
Corporate Author : OHIO STATE UNIV COLUMBUS COMPUTER AND INFORMATION SCIENCE RESEARCH CENTER
Personal Author(s) : Baum,Richard I. ; Hsiao,David K.
Report Date : JUL 1974
Pagination or Media Count : 31
Abstract : A simple data model based on semantic connections is used as a vehicle to elaborate on protection enforcement mechanisms in the data secure computer. Two types of protection enforcement mechanisms are introduced: concealment protection enforcement and information-theoretic enforcement. A concealment enforcement mechanism protects information by selectivity preventing user access to certain data items. An information-theoretic enforcement mechanism prevents the probability that a user knows of the existence of a data item from exceeding a threshold. (Modified author abstract)
Descriptors : *Data processing security, Data bases, Computer architecture, Protection, Information theory, Semantics
Subject Categories : Computer Hardware
Computer Systems Management and Standards
Distribution Statement : APPROVED FOR PUBLIC RELEASE