Hostname: page-component-7479d7b7d-rvbq7 Total loading time: 0 Render date: 2024-07-11T18:17:41.048Z Has data issue: false hasContentIssue false

Protection of Data Privacy in Computer Systems

Published online by Cambridge University Press:  16 February 2016

Get access

Extract

The protection of data in computer-based systems is a serious and growing problem. It is one of the most challenging technical problems in the field of computer science today. The objective of this paper is to provide a technical overview of the problem and to suggest some steps that need to be taken to assure progress in the field toward cost-effective systems that provide adequate protection.

The Problem: Protecting the privacy of data in computer systems involves establishing safeguards against accidental disclosure as well as protection against a deliberate attack. During system failures and restart procedures errors in coding procedures often cause data to be stored in the wrong files or put sensitive data out on the printer along with diagnostic information intended for maintenance personnel. You have probably had the experience at some time of being wired into someone else's telephone conversation.

Type
Erwin S. Shimron Memorial International Symposium: The Computer And The Law
Copyright
Copyright © Cambridge University Press and The Faculty of Law, The Hebrew University of Jerusalem 1986

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 Benzel, T. C. Vickers and Tavilla, D. A., “Trusted Software Verification: A Case Study”, Proceedings of the 1985 Symposium on Security and Privacy, IEEE Computer Society, Oakland, California (April 22–24, 1985)Google Scholar; V. D. Gligor, “Analysis of the Hardware Verification of the Honeywell Scomp”, ibid.; D. E. Denning, “Commutative Filter for Reducing Inference Threats in Multilevel Database Systems”, ibid.

2 DoD Computer Security Center, Department of Defense Trusted Computer System Evaluation Criteria, CSC-STD–001–83, (August 15, 1983).