A survey of security issues in office computation and the application of secure computing models to office systems
With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot...
Gespeichert in:
Veröffentlicht in: | Computers & security 1993, Vol.12 (1), p.79-97 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 97 |
---|---|
container_issue | 1 |
container_start_page | 79 |
container_title | Computers & security |
container_volume | 12 |
creator | Vaughn, R.B. Saiedian, H. Unger, E.A. |
description | With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot, in most cases, be applied directly to the OIS envitonment. Many OIS do not provide the hardware/software controls necessary to protect information from anyone who gains physical access to the system. Furthermore, users of an OIS cannot be expected to possess a clear understanding of the system, its operating characteristics, or even the implication of interconnecting component devices. This paper examines the typical OIS environment with a view toward the provision of a secure operating architecture. Important security problems faced by OIS are enumerated and explained. We argue that the OIS environment presents a different problem to solve in a security sense from when working with a traditional nondistributed system. Existing solutions found in large scale operating systems and networks cannot simply be scaled down and moved to an OIS, if for no other reason than the architecture's inability to support locks and multiple system states. An architecture of both software and hardware controls must be built for this new environment using concepts from large scale operating systems but recognizing the limitations and constraints of OIS. While we emphasize the security issues, we look at alternative technologies that can be combined to provide a solution. |
doi_str_mv | 10.1016/0167-4048(93)90014-V |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_23840250</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>016740489390014V</els_id><sourcerecordid>23840250</sourcerecordid><originalsourceid>FETCH-LOGICAL-c277t-b1965cb63d7ef2dc1b8f1a15d59a555079dbdd8ed945d823eb5728ef303741e23</originalsourceid><addsrcrecordid>eNp9kc9L5TAQx4Os4Fv1P_AQ9iC7h2qSNk16EUTWHyB4Ua-hTaYaaZtuJhXef2-ez7eHPexhGBg-3y8z3yHkhLMzznh9nksVFav0z6b81TDGq-J5j6y4VqKoBdPfyOovckC-I75lRtVar0i8pLjEd1jT0FMEu0Sf1tQjLoDUT3naewvUhnFeUpt8mGg7OZpegbbzPHi7ne3EO9JPL3QMDgakKexMcI0JRjwi-307IBx_9UPydP378eq2uH-4ubu6vC-sUCoVHW9qabu6dAp64SzvdM9bLp1sWiklU43rnNPgmko6LUropBIa-pKVquIgykNyuvWdY_iTz0lm9GhhGNoJwoJGlLpiQrIM_vgHfAtLnPJuRjCVKaGbDFVbyMaAGKE3c_RjG9eGM7P5gtlEbDYRm6Y0n18wz1l2sZXlKODdQzRoPUwWnI9gk3HB_9_gAwvBkEo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207384289</pqid></control><display><type>article</type><title>A survey of security issues in office computation and the application of secure computing models to office systems</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Vaughn, R.B. ; Saiedian, H. ; Unger, E.A.</creator><creatorcontrib>Vaughn, R.B. ; Saiedian, H. ; Unger, E.A.</creatorcontrib><description>With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot, in most cases, be applied directly to the OIS envitonment. Many OIS do not provide the hardware/software controls necessary to protect information from anyone who gains physical access to the system. Furthermore, users of an OIS cannot be expected to possess a clear understanding of the system, its operating characteristics, or even the implication of interconnecting component devices. This paper examines the typical OIS environment with a view toward the provision of a secure operating architecture. Important security problems faced by OIS are enumerated and explained. We argue that the OIS environment presents a different problem to solve in a security sense from when working with a traditional nondistributed system. Existing solutions found in large scale operating systems and networks cannot simply be scaled down and moved to an OIS, if for no other reason than the architecture's inability to support locks and multiple system states. An architecture of both software and hardware controls must be built for this new environment using concepts from large scale operating systems but recognizing the limitations and constraints of OIS. While we emphasize the security issues, we look at alternative technologies that can be combined to provide a solution.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/0167-4048(93)90014-V</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Computer architecture ; Cybersecurity ; Information systems ; Office information systems ; Operating systems ; Privacy ; Protection ; Security models ; Systems design</subject><ispartof>Computers & security, 1993, Vol.12 (1), p.79-97</ispartof><rights>1993</rights><rights>Copyright Elsevier Sequoia S.A. Feb 1993</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c277t-b1965cb63d7ef2dc1b8f1a15d59a555079dbdd8ed945d823eb5728ef303741e23</citedby><cites>FETCH-LOGICAL-c277t-b1965cb63d7ef2dc1b8f1a15d59a555079dbdd8ed945d823eb5728ef303741e23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/0167-4048(93)90014-V$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,4024,27923,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Vaughn, R.B.</creatorcontrib><creatorcontrib>Saiedian, H.</creatorcontrib><creatorcontrib>Unger, E.A.</creatorcontrib><title>A survey of security issues in office computation and the application of secure computing models to office systems</title><title>Computers & security</title><description>With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot, in most cases, be applied directly to the OIS envitonment. Many OIS do not provide the hardware/software controls necessary to protect information from anyone who gains physical access to the system. Furthermore, users of an OIS cannot be expected to possess a clear understanding of the system, its operating characteristics, or even the implication of interconnecting component devices. This paper examines the typical OIS environment with a view toward the provision of a secure operating architecture. Important security problems faced by OIS are enumerated and explained. We argue that the OIS environment presents a different problem to solve in a security sense from when working with a traditional nondistributed system. Existing solutions found in large scale operating systems and networks cannot simply be scaled down and moved to an OIS, if for no other reason than the architecture's inability to support locks and multiple system states. An architecture of both software and hardware controls must be built for this new environment using concepts from large scale operating systems but recognizing the limitations and constraints of OIS. While we emphasize the security issues, we look at alternative technologies that can be combined to provide a solution.</description><subject>Computer architecture</subject><subject>Cybersecurity</subject><subject>Information systems</subject><subject>Office information systems</subject><subject>Operating systems</subject><subject>Privacy</subject><subject>Protection</subject><subject>Security models</subject><subject>Systems design</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1993</creationdate><recordtype>article</recordtype><recordid>eNp9kc9L5TAQx4Os4Fv1P_AQ9iC7h2qSNk16EUTWHyB4Ua-hTaYaaZtuJhXef2-ez7eHPexhGBg-3y8z3yHkhLMzznh9nksVFav0z6b81TDGq-J5j6y4VqKoBdPfyOovckC-I75lRtVar0i8pLjEd1jT0FMEu0Sf1tQjLoDUT3naewvUhnFeUpt8mGg7OZpegbbzPHi7ne3EO9JPL3QMDgakKexMcI0JRjwi-307IBx_9UPydP378eq2uH-4ubu6vC-sUCoVHW9qabu6dAp64SzvdM9bLp1sWiklU43rnNPgmko6LUropBIa-pKVquIgykNyuvWdY_iTz0lm9GhhGNoJwoJGlLpiQrIM_vgHfAtLnPJuRjCVKaGbDFVbyMaAGKE3c_RjG9eGM7P5gtlEbDYRm6Y0n18wz1l2sZXlKODdQzRoPUwWnI9gk3HB_9_gAwvBkEo</recordid><startdate>1993</startdate><enddate>1993</enddate><creator>Vaughn, R.B.</creator><creator>Saiedian, H.</creator><creator>Unger, E.A.</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>1993</creationdate><title>A survey of security issues in office computation and the application of secure computing models to office systems</title><author>Vaughn, R.B. ; Saiedian, H. ; Unger, E.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c277t-b1965cb63d7ef2dc1b8f1a15d59a555079dbdd8ed945d823eb5728ef303741e23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1993</creationdate><topic>Computer architecture</topic><topic>Cybersecurity</topic><topic>Information systems</topic><topic>Office information systems</topic><topic>Operating systems</topic><topic>Privacy</topic><topic>Protection</topic><topic>Security models</topic><topic>Systems design</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Vaughn, R.B.</creatorcontrib><creatorcontrib>Saiedian, H.</creatorcontrib><creatorcontrib>Unger, E.A.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vaughn, R.B.</au><au>Saiedian, H.</au><au>Unger, E.A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey of security issues in office computation and the application of secure computing models to office systems</atitle><jtitle>Computers & security</jtitle><date>1993</date><risdate>1993</risdate><volume>12</volume><issue>1</issue><spage>79</spage><epage>97</epage><pages>79-97</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot, in most cases, be applied directly to the OIS envitonment. Many OIS do not provide the hardware/software controls necessary to protect information from anyone who gains physical access to the system. Furthermore, users of an OIS cannot be expected to possess a clear understanding of the system, its operating characteristics, or even the implication of interconnecting component devices. This paper examines the typical OIS environment with a view toward the provision of a secure operating architecture. Important security problems faced by OIS are enumerated and explained. We argue that the OIS environment presents a different problem to solve in a security sense from when working with a traditional nondistributed system. Existing solutions found in large scale operating systems and networks cannot simply be scaled down and moved to an OIS, if for no other reason than the architecture's inability to support locks and multiple system states. An architecture of both software and hardware controls must be built for this new environment using concepts from large scale operating systems but recognizing the limitations and constraints of OIS. While we emphasize the security issues, we look at alternative technologies that can be combined to provide a solution.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/0167-4048(93)90014-V</doi><tpages>19</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 1993, Vol.12 (1), p.79-97 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_miscellaneous_23840250 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Computer architecture Cybersecurity Information systems Office information systems Operating systems Privacy Protection Security models Systems design |
title | A survey of security issues in office computation and the application of secure computing models to office systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T12%3A37%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20of%20security%20issues%20in%20office%20computation%20and%20the%20application%20of%20secure%20computing%20models%20to%20office%20systems&rft.jtitle=Computers%20&%20security&rft.au=Vaughn,%20R.B.&rft.date=1993&rft.volume=12&rft.issue=1&rft.spage=79&rft.epage=97&rft.pages=79-97&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/0167-4048(93)90014-V&rft_dat=%3Cproquest_cross%3E23840250%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207384289&rft_id=info:pmid/&rft_els_id=016740489390014V&rfr_iscdi=true |