Abstract :
The paper discusses some promising advances in computer security. Security system designers and implementers must consider several factors: security policy, privileges, authentication, correctness and auditing. The paper presents an overview of some sub-fields and their successes: trusted systems, operating systems, database management systems, distributed systems, cryptography, protocols, system correctness, intrusion detection and mobile code
Keywords :
data privacy; database management systems; distributed processing; operating systems (computers); security of data; auditing; authentication; computer security; correctness; cryptography; data privacy; database management systems; distributed systems; intrusion detection; mobile code; operating systems; privilege; protocols; security policy; system correctness; trusted systems; Authentication; Computer security; Cryptographic protocols; Cryptography; Data security; Database systems; Distributed computing; Electronic mail; Intrusion detection; Invasive software; Military computing; Operating systems; Privacy; Protection; Satellites; Solids;