Primary Access Control in Large-scale Time-shared Decision Systems
The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the ac...
Main Author: | |
---|---|
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149402 |
_version_ | 1811076407106732032 |
---|---|
author | Owens, Richard C., Jr. |
author_facet | Owens, Richard C., Jr. |
author_sort | Owens, Richard C., Jr. |
collection | MIT |
description | The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the access control problem are identified. They are: 1) the physical level at which to apply control; 2) the fineness of distinction applied to the term ""access"" 3) the meaning of the term "user identification",and 4) the degree of sophistication employed in automatically assigned restrictions to new data files. |
first_indexed | 2024-09-23T10:21:17Z |
id | mit-1721.1/149402 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T10:21:17Z |
publishDate | 2023 |
record_format | dspace |
spelling | mit-1721.1/1494022023-03-30T04:02:37Z Primary Access Control in Large-scale Time-shared Decision Systems Owens, Richard C., Jr. The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the access control problem are identified. They are: 1) the physical level at which to apply control; 2) the fineness of distinction applied to the term ""access"" 3) the meaning of the term "user identification",and 4) the degree of sophistication employed in automatically assigned restrictions to new data files. 2023-03-29T14:55:40Z 2023-03-29T14:55:40Z 1971-07 https://hdl.handle.net/1721.1/149402 04074666 MIT-LCS-TR-089 MAC-TR-089 application/pdf |
spellingShingle | Owens, Richard C., Jr. Primary Access Control in Large-scale Time-shared Decision Systems |
title | Primary Access Control in Large-scale Time-shared Decision Systems |
title_full | Primary Access Control in Large-scale Time-shared Decision Systems |
title_fullStr | Primary Access Control in Large-scale Time-shared Decision Systems |
title_full_unstemmed | Primary Access Control in Large-scale Time-shared Decision Systems |
title_short | Primary Access Control in Large-scale Time-shared Decision Systems |
title_sort | primary access control in large scale time shared decision systems |
url | https://hdl.handle.net/1721.1/149402 |
work_keys_str_mv | AT owensrichardcjr primaryaccesscontrolinlargescaletimeshareddecisionsystems |