1984
DOI: 10.1147/sj.234.0309
|View full text |Cite
|
Sign up to set email alerts
|

An overview of computer security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

1984
1984
2015
2015

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…Time and power are close, and must be, for what is power but the attempt to control time, buy time, bide time. 1…”
Section: Thesis Structurementioning
confidence: 99%
See 3 more Smart Citations
“…Time and power are close, and must be, for what is power but the attempt to control time, buy time, bide time. 1…”
Section: Thesis Structurementioning
confidence: 99%
“…Have eyes to wonder, but lack tongues to praise. 1 To define the present in isolation is to kill it. 2…”
Section: Diagnosing the Presentmentioning
confidence: 99%
See 2 more Smart Citations
“…The past thirty years or more has seen a number of security models developed, meeting complementary requirements for security in computer systems. [10,11] Experimental and "small run" operating systems have been developed and deployed using these models but none, outside the basic "access control list (ACL)" structure has really been accepted in mass market operating systems and allied software products.…”
Section: Themes and Challengesmentioning
confidence: 99%