A Data Secure Computer Architecture. Part I.
OHIO STATE UNIV COLUMBUS COMPUTER AND INFORMATION SCIENCE RESEARCH CENTER
Pagination or Media Count:
A simple data model based on semantic connections is used as a vehicle to elaborate on protection enforcement mechanisms in the data secure computer. Two types of protection enforcement mechanisms are introduced concealment protection enforcement and information-theoretic enforcement. A concealment enforcement mechanism protects information by selectivity preventing user access to certain data items. An information-theoretic enforcement mechanism prevents the probability that a user knows of the existence of a data item from exceeding a threshold. Modified author abstract
- Computer Hardware
- Computer Systems Management and Standards