ACM SIGMOD Anthology VLDB dblp.uni-trier.de

Privacy and Security of Data Communications and Data Bases.

David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick: Privacy and Security of Data Communications and Data Bases. VLDB 1978: 55-67
@inproceedings{DBLP:conf/vldb/HsiaoKM78,
  author    = {David K. Hsiao and
               Douglas S. Kerr and
               Stuart E. Madnick},
  editor    = {S. Bing Yao},
  title     = {Privacy and Security of Data Communications and Data Bases},
  booktitle = {Fourth International Conference on Very Large Data Bases, September
               13-15, 1978, West Berlin, Germany},
  publisher = {IEEE Computer Society},
  year      = {1978},
  pages     = {55-67},
  ee        = {db/conf/vldb/HsiaoKM78.html},
  crossref  = {DBLP:conf/vldb/78},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Computer security deals with the managerial procedures and technological safeguards applied to computer hardware, software, and data to assure against accidental or deliberate unauthorized access to and the dissemination of computer system data. Computer privacy, on the other hand, is concerned with the moral and legal requirements to protect data from unauthorized access and dissemination. The issues involved in computer privacy are therefore political decisions regarding who may have access to what and who may disseminate what, whereas the issues involved in computer security are procedures and safeguards for enforcing the privacy decisions. The motivations for security and privacy can be found in the desire for secrecy in military affairs, for nondisclosure in industrial applications, and for information-sharing in modern society. These motivations have become particularly acute where computers are used since computers play a major and important role in processing and storing of information. This paper discusses computer privacy and data security. Other issues such as operational security, physical security, hardware security, and operating system security are discussed in [1,2,3] and will not be included here.

Copyright © 1978 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

S. Bing Yao (Ed.): Fourth International Conference on Very Large Data Bases, September 13-15, 1978, West Berlin, Germany. IEEE Computer Society 1978
Contents BibTeX

References

[1]
...
[2]
...
[3]
...
[4]
...
[5]
Theodore A. Linden: Operating System Structures to Support Security and Reliable Software. ACM Comput. Surv. 8(4): 409-445(1976) BibTeX
[6]
...
[7]
...
[8]
...
[9]
...
[10]
...
[11]
...
[12]
...
[13]
...
[14]
...
[15]
...
[16]
...
[17]
...
[18]
...
[19]
H. Rex Hartson, David K. Hsiao: A Semantic Model for Data Base Protection Languages. VLDB 1976: 27-42 BibTeX
[20]
David K. Hsiao, Richard I. Baum: Information Secure Systems. Advances in Computers 14: 231-272(1976) BibTeX
[21]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
[22]
Clement T. Yu, Francis Y. L. Chin: A Study on the Protection of Statistical Data Bases. SIGMOD Conference 1977: 169-181 BibTeX
[23]
...
[24]
...
[25]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[26]
...
[27]
...
[28]
Michael Stonebraker: Implementation of Integrity Constraints and Views by Query Modification. SIGMOD Conference 1975: 65-78 BibTeX
[29]
...
[30]
...
[31]
Eduardo B. Fernández, Rita C. Summers, Tomás Lang: Definition and Evaluation of Access Rules in Data Management Systems. VLDB 1975: 268-285 BibTeX
[32]
John Miles Smith, Diane C. P. Smith: Database Abstractions: Aggregation. Commun. ACM 20(6): 405-413(1977) BibTeX
[33]
John Miles Smith, Diane C. P. Smith: Database Abstractions: Aggregation and Generalization. ACM Trans. Database Syst. 2(2): 105-133(1977) BibTeX
[34]
...
[35]
...
[37]
...
[38]
...
[39]
...
[40]
...
[41]
...
[42]
Theodore D. Friedman, Lance J. Hoffman: Execution Time Requirements for Encipherment Programs. Commun. ACM 17(8): 445-449(1974) BibTeX
[43]
...
[44]
...
[45]
...
[46]
Rudolf Bayer, J. K. Metzger: On the Encipherment of Search Trees and Random Access Files. ACM Trans. Database Syst. 1(1): 37-52(1976) BibTeX
[47]
...
[48]
...
[49]
...
[50]
...
[51]
...
[52]
...

Referenced by

  1. Zbigniew Michalewicz: Statistical Databases: Their Model, Query Language and Security. SSDBM 1983: 391-402
  2. Gary H. Sockut, Robert P. Goldberg: Database Reorganization - Principles and Practice. ACM Comput. Surv. 11(4): 371-395(1979)
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
VLDB Proceedings (1977-1981): Copyright © by IEEE,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:45:01 2009