A survey of security issues in office computation and the application of secure computing models to office systems

With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 1993, Vol.12 (1), p.79-97
Hauptverfasser: Vaughn, R.B., Saiedian, H., Unger, E.A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 97
container_issue 1
container_start_page 79
container_title Computers & security
container_volume 12
creator Vaughn, R.B.
Saiedian, H.
Unger, E.A.
description With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot, in most cases, be applied directly to the OIS envitonment. Many OIS do not provide the hardware/software controls necessary to protect information from anyone who gains physical access to the system. Furthermore, users of an OIS cannot be expected to possess a clear understanding of the system, its operating characteristics, or even the implication of interconnecting component devices. This paper examines the typical OIS environment with a view toward the provision of a secure operating architecture. Important security problems faced by OIS are enumerated and explained. We argue that the OIS environment presents a different problem to solve in a security sense from when working with a traditional nondistributed system. Existing solutions found in large scale operating systems and networks cannot simply be scaled down and moved to an OIS, if for no other reason than the architecture's inability to support locks and multiple system states. An architecture of both software and hardware controls must be built for this new environment using concepts from large scale operating systems but recognizing the limitations and constraints of OIS. While we emphasize the security issues, we look at alternative technologies that can be combined to provide a solution.
doi_str_mv 10.1016/0167-4048(93)90014-V
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_23840250</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>016740489390014V</els_id><sourcerecordid>23840250</sourcerecordid><originalsourceid>FETCH-LOGICAL-c277t-b1965cb63d7ef2dc1b8f1a15d59a555079dbdd8ed945d823eb5728ef303741e23</originalsourceid><addsrcrecordid>eNp9kc9L5TAQx4Os4Fv1P_AQ9iC7h2qSNk16EUTWHyB4Ua-hTaYaaZtuJhXef2-ez7eHPexhGBg-3y8z3yHkhLMzznh9nksVFav0z6b81TDGq-J5j6y4VqKoBdPfyOovckC-I75lRtVar0i8pLjEd1jT0FMEu0Sf1tQjLoDUT3naewvUhnFeUpt8mGg7OZpegbbzPHi7ne3EO9JPL3QMDgakKexMcI0JRjwi-307IBx_9UPydP378eq2uH-4ubu6vC-sUCoVHW9qabu6dAp64SzvdM9bLp1sWiklU43rnNPgmko6LUropBIa-pKVquIgykNyuvWdY_iTz0lm9GhhGNoJwoJGlLpiQrIM_vgHfAtLnPJuRjCVKaGbDFVbyMaAGKE3c_RjG9eGM7P5gtlEbDYRm6Y0n18wz1l2sZXlKODdQzRoPUwWnI9gk3HB_9_gAwvBkEo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>207384289</pqid></control><display><type>article</type><title>A survey of security issues in office computation and the application of secure computing models to office systems</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Vaughn, R.B. ; Saiedian, H. ; Unger, E.A.</creator><creatorcontrib>Vaughn, R.B. ; Saiedian, H. ; Unger, E.A.</creatorcontrib><description>With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot, in most cases, be applied directly to the OIS envitonment. Many OIS do not provide the hardware/software controls necessary to protect information from anyone who gains physical access to the system. Furthermore, users of an OIS cannot be expected to possess a clear understanding of the system, its operating characteristics, or even the implication of interconnecting component devices. This paper examines the typical OIS environment with a view toward the provision of a secure operating architecture. Important security problems faced by OIS are enumerated and explained. We argue that the OIS environment presents a different problem to solve in a security sense from when working with a traditional nondistributed system. Existing solutions found in large scale operating systems and networks cannot simply be scaled down and moved to an OIS, if for no other reason than the architecture's inability to support locks and multiple system states. An architecture of both software and hardware controls must be built for this new environment using concepts from large scale operating systems but recognizing the limitations and constraints of OIS. While we emphasize the security issues, we look at alternative technologies that can be combined to provide a solution.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/0167-4048(93)90014-V</identifier><identifier>CODEN: CPSEDU</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Computer architecture ; Cybersecurity ; Information systems ; Office information systems ; Operating systems ; Privacy ; Protection ; Security models ; Systems design</subject><ispartof>Computers &amp; security, 1993, Vol.12 (1), p.79-97</ispartof><rights>1993</rights><rights>Copyright Elsevier Sequoia S.A. Feb 1993</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c277t-b1965cb63d7ef2dc1b8f1a15d59a555079dbdd8ed945d823eb5728ef303741e23</citedby><cites>FETCH-LOGICAL-c277t-b1965cb63d7ef2dc1b8f1a15d59a555079dbdd8ed945d823eb5728ef303741e23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/0167-4048(93)90014-V$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,4024,27923,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Vaughn, R.B.</creatorcontrib><creatorcontrib>Saiedian, H.</creatorcontrib><creatorcontrib>Unger, E.A.</creatorcontrib><title>A survey of security issues in office computation and the application of secure computing models to office systems</title><title>Computers &amp; security</title><description>With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot, in most cases, be applied directly to the OIS envitonment. Many OIS do not provide the hardware/software controls necessary to protect information from anyone who gains physical access to the system. Furthermore, users of an OIS cannot be expected to possess a clear understanding of the system, its operating characteristics, or even the implication of interconnecting component devices. This paper examines the typical OIS environment with a view toward the provision of a secure operating architecture. Important security problems faced by OIS are enumerated and explained. We argue that the OIS environment presents a different problem to solve in a security sense from when working with a traditional nondistributed system. Existing solutions found in large scale operating systems and networks cannot simply be scaled down and moved to an OIS, if for no other reason than the architecture's inability to support locks and multiple system states. An architecture of both software and hardware controls must be built for this new environment using concepts from large scale operating systems but recognizing the limitations and constraints of OIS. While we emphasize the security issues, we look at alternative technologies that can be combined to provide a solution.</description><subject>Computer architecture</subject><subject>Cybersecurity</subject><subject>Information systems</subject><subject>Office information systems</subject><subject>Operating systems</subject><subject>Privacy</subject><subject>Protection</subject><subject>Security models</subject><subject>Systems design</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1993</creationdate><recordtype>article</recordtype><recordid>eNp9kc9L5TAQx4Os4Fv1P_AQ9iC7h2qSNk16EUTWHyB4Ua-hTaYaaZtuJhXef2-ez7eHPexhGBg-3y8z3yHkhLMzznh9nksVFav0z6b81TDGq-J5j6y4VqKoBdPfyOovckC-I75lRtVar0i8pLjEd1jT0FMEu0Sf1tQjLoDUT3naewvUhnFeUpt8mGg7OZpegbbzPHi7ne3EO9JPL3QMDgakKexMcI0JRjwi-307IBx_9UPydP378eq2uH-4ubu6vC-sUCoVHW9qabu6dAp64SzvdM9bLp1sWiklU43rnNPgmko6LUropBIa-pKVquIgykNyuvWdY_iTz0lm9GhhGNoJwoJGlLpiQrIM_vgHfAtLnPJuRjCVKaGbDFVbyMaAGKE3c_RjG9eGM7P5gtlEbDYRm6Y0n18wz1l2sZXlKODdQzRoPUwWnI9gk3HB_9_gAwvBkEo</recordid><startdate>1993</startdate><enddate>1993</enddate><creator>Vaughn, R.B.</creator><creator>Saiedian, H.</creator><creator>Unger, E.A.</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>1993</creationdate><title>A survey of security issues in office computation and the application of secure computing models to office systems</title><author>Vaughn, R.B. ; Saiedian, H. ; Unger, E.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c277t-b1965cb63d7ef2dc1b8f1a15d59a555079dbdd8ed945d823eb5728ef303741e23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1993</creationdate><topic>Computer architecture</topic><topic>Cybersecurity</topic><topic>Information systems</topic><topic>Office information systems</topic><topic>Operating systems</topic><topic>Privacy</topic><topic>Protection</topic><topic>Security models</topic><topic>Systems design</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Vaughn, R.B.</creatorcontrib><creatorcontrib>Saiedian, H.</creatorcontrib><creatorcontrib>Unger, E.A.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vaughn, R.B.</au><au>Saiedian, H.</au><au>Unger, E.A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey of security issues in office computation and the application of secure computing models to office systems</atitle><jtitle>Computers &amp; security</jtitle><date>1993</date><risdate>1993</risdate><volume>12</volume><issue>1</issue><spage>79</spage><epage>97</epage><pages>79-97</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><coden>CPSEDU</coden><abstract>With the proliferation of office information systems (OIS) into almost every area of industry and government, it is important to design systems that offer a guarantee of privacy and security to their users. The same solutions and research pertaining to traditional data-processing environments cannot, in most cases, be applied directly to the OIS envitonment. Many OIS do not provide the hardware/software controls necessary to protect information from anyone who gains physical access to the system. Furthermore, users of an OIS cannot be expected to possess a clear understanding of the system, its operating characteristics, or even the implication of interconnecting component devices. This paper examines the typical OIS environment with a view toward the provision of a secure operating architecture. Important security problems faced by OIS are enumerated and explained. We argue that the OIS environment presents a different problem to solve in a security sense from when working with a traditional nondistributed system. Existing solutions found in large scale operating systems and networks cannot simply be scaled down and moved to an OIS, if for no other reason than the architecture's inability to support locks and multiple system states. An architecture of both software and hardware controls must be built for this new environment using concepts from large scale operating systems but recognizing the limitations and constraints of OIS. While we emphasize the security issues, we look at alternative technologies that can be combined to provide a solution.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/0167-4048(93)90014-V</doi><tpages>19</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 1993, Vol.12 (1), p.79-97
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_miscellaneous_23840250
source Elsevier ScienceDirect Journals Complete
subjects Computer architecture
Cybersecurity
Information systems
Office information systems
Operating systems
Privacy
Protection
Security models
Systems design
title A survey of security issues in office computation and the application of secure computing models to office systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T12%3A37%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20of%20security%20issues%20in%20office%20computation%20and%20the%20application%20of%20secure%20computing%20models%20to%20office%20systems&rft.jtitle=Computers%20&%20security&rft.au=Vaughn,%20R.B.&rft.date=1993&rft.volume=12&rft.issue=1&rft.spage=79&rft.epage=97&rft.pages=79-97&rft.issn=0167-4048&rft.eissn=1872-6208&rft.coden=CPSEDU&rft_id=info:doi/10.1016/0167-4048(93)90014-V&rft_dat=%3Cproquest_cross%3E23840250%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=207384289&rft_id=info:pmid/&rft_els_id=016740489390014V&rfr_iscdi=true