Primary Access Control in Large-scale Time-shared Decision Systems

The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the ac...

Full description

Bibliographic Details
Main Author: Owens, Richard C., Jr.
Published: 2023
Online Access:https://hdl.handle.net/1721.1/149402
_version_ 1811076407106732032
author Owens, Richard C., Jr.
author_facet Owens, Richard C., Jr.
author_sort Owens, Richard C., Jr.
collection MIT
description The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the access control problem are identified. They are: 1) the physical level at which to apply control; 2) the fineness of distinction applied to the term ""access"" 3) the meaning of the term "user identification",and 4) the degree of sophistication employed in automatically assigned restrictions to new data files.
first_indexed 2024-09-23T10:21:17Z
id mit-1721.1/149402
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T10:21:17Z
publishDate 2023
record_format dspace
spelling mit-1721.1/1494022023-03-30T04:02:37Z Primary Access Control in Large-scale Time-shared Decision Systems Owens, Richard C., Jr. The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the access control problem are identified. They are: 1) the physical level at which to apply control; 2) the fineness of distinction applied to the term ""access"" 3) the meaning of the term "user identification",and 4) the degree of sophistication employed in automatically assigned restrictions to new data files. 2023-03-29T14:55:40Z 2023-03-29T14:55:40Z 1971-07 https://hdl.handle.net/1721.1/149402 04074666 MIT-LCS-TR-089 MAC-TR-089 application/pdf
spellingShingle Owens, Richard C., Jr.
Primary Access Control in Large-scale Time-shared Decision Systems
title Primary Access Control in Large-scale Time-shared Decision Systems
title_full Primary Access Control in Large-scale Time-shared Decision Systems
title_fullStr Primary Access Control in Large-scale Time-shared Decision Systems
title_full_unstemmed Primary Access Control in Large-scale Time-shared Decision Systems
title_short Primary Access Control in Large-scale Time-shared Decision Systems
title_sort primary access control in large scale time shared decision systems
url https://hdl.handle.net/1721.1/149402
work_keys_str_mv AT owensrichardcjr primaryaccesscontrolinlargescaletimeshareddecisionsystems