Title :
The many faces of data vulnerability: Information can be tapped when resident in memory. It can also be intercepted en route, on paper, and elsewhere
Author_Institution :
SRI Internat., Menlo Park, CA, USA
fDate :
5/1/1984 12:00:00 AM
Abstract :
The author looks at the need for new computer security methods as well as the practical limits to the level of security that can be attained. He discusses a theory of information security which is based on the concepts of safeguard principles and of objects and subjects.
Keywords :
security of data; computer security methods; data vulnerability; information security; safeguard principles; security of data; Computer security; Computers; Humans; Information security; Law; Organizations;
Journal_Title :
Spectrum, IEEE
DOI :
10.1109/MSPEC.1984.6370266