NCJ Number
57949
Date Published
1978
Length
48 pages
Annotation
THIS BIBLIOGRAPHY CONCERNS THE PROTECTION OF COMPUTER OPERATING SYSTEMS. IT IS ACCOMPANIED BY AN INDEX OF KEYWORDS FOUND IN THE CONTENT DESCRIPTION OF BIBLIOGRAPHIC ENTRIES.
Abstract
COMPUTER OPERATING SYSTEM REQUIREMENTS, POLICIES, AND MECHANISMS FOR ENSURING USER AND OPERATING SYSTEM PROGRAM AND DATA INTEGRITY AND CONFIDENTIALITY ARE LISTED TOPICS. PERIPHERAL TOPICS HAVE BEEN SPECIFICALLY EXCLUDED, EXCEPT WHERE THEY OCCUR TOGETHER WITH THE MAIN SUBJECT OF THE BIBLIOGRAPHY. SUCH TOPICS INCLUDE USER IDENTIFICATION AND AUTHENTICATION, ENCRYPTION, HARDWARE RELIABILITY; ERROR DETECTION METHODS, SYSTEM GENERATION AND INITIALIZATION; HUMAN INTEGRITY (ADMINISTRATION AND OPERATIONS STAFF), PHYSICAL INSTALLATION SECURITY, COMMUNICATIONS SECURITY, AND BROAD ECONOMIC, SOCIAL, AND POLITICAL ISSUES. THE BIBLIOGRAPHY CONTAINS 173 ENTRIES, AND THE INDEX REFLECTS THE EXTENT TO WHICH TECHNICAL TERMS ARE DEFINED AND USED CONSISTENTLY IN THE BIBLIOGRAPHY. EACH BIBLIOGRAPHIC ENTRY HAS THE FOLLOWING FIELDS: IDENTIFIER, AUTHOR'S NAME, TITLE OF DOCUMENT, SOURCE DATA FILES, ANNOTATION, AND KEYWORDS OR LIST OF KEYWORDS. THE BIBLIOGRAPHY AND INDEX WERE COMPILED FOR THE DEFENSE DOCUMENTATION CENTER IN ALEXANDRIA, VA. (DEP)