Descriptor
| Computer Storage Devices | 4 |
| Computers | 4 |
| Data Processing | 4 |
| Security | 4 |
| Computer Oriented Programs | 2 |
| Confidential Records | 2 |
| Confidentiality | 2 |
| Databases | 2 |
| Annotated Bibliographies | 1 |
| Bibliographies | 1 |
| Computer Programs | 1 |
| More ▼ | |
Publication Type
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedZaiden, Dennis J. – School Management, 1973
Describes EDP (electronic data processing) insurance, which provides coverage for such things as the loss of computer programs and accumulated transaction data, and the consequences of an interruption in processing. Discusses what is and is not covered by EDP insurance, how to plan for EDP insurance, the amount of coverage to get, and how to avoid…
Descriptors: Computer Oriented Programs, Computer Storage Devices, Computers, Data Processing
Hsiao, David K. – 1973
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Descriptors: Computer Programs, Computer Storage Devices, Computers, Confidentiality
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing
Bergart, Jeffrey G.; And Others – 1972
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Descriptors: Annotated Bibliographies, Bibliographies, Computer Oriented Programs, Computer Science


