This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Protection structures
June 1974 (vol. 7 no. 6)
pp. 22-33
Gerald J. Popek, University of California at Los Angeles
The ability to selectively control access to information in computing systems has taken on a heightened importance in recent years, and we can expect that concern to continue to grow. Large amounts of data are now being concentrated in readily processible form, technical developments in networking are linking those collections, and the computing power available to examine these data continues to increase. Each of these developments is being accompanied by dramatic decreases in costs. Public, institutional, governmental, and military concern over the impact of improper, inadequate controls and safeguards for this increasingly concentrated, inexpensive, and pervasive information processing power is rightfully increasing.
Citation:
Gerald J. Popek, "Protection structures," Computer, vol. 7, no. 6, pp. 22-33, June 1974, doi:10.1109/MC.1974.6323580
Usage of this product signifies your acceptance of the Terms of Use.