Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/800122.803960acmconferencesArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article
Free access

Virtual machines and data security

Published: 26 March 1973 Publication History

Abstract

Our concern is the ability of the computing system to ensure that data under its control is accessed only in accordance with the explicit intention of the owner of the data, as expressed in the directory or access control table of the system.
We intend to use VM/370 as the base system for a study of how the security of data may be compromised. Our goal for this study is to be better able to evaluate different types of hardware and software system architectures with regard to their ability to provide security.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
Proceedings of the workshop on virtual computer systems
March 1973
253 pages
ISBN:9781450374279
DOI:10.1145/800122
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 March 1973

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)4
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Cloud Computing for Secure Services in E-Government ArchitectureWeb Services10.4018/978-1-5225-7501-6.ch033(597-617)Online publication date: 2019
  • (2016)Cloud Computing for Secure Services in E-Government ArchitectureWeb-Based Services10.4018/978-1-4666-9466-8.ch076(1727-1746)Online publication date: 2016
  • (2016)An efficient security solution for cloud environment2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES)10.1109/SCOPES.2016.7955583(950-959)Online publication date: Oct-2016
  • (2015)Cloud Computing for Secure Services in E-Government ArchitectureJournal of Information Technology Research10.4018/JITR.20150101048:1(43-61)Online publication date: Jan-2015
  • (2011)ReviewJournal of Network and Computer Applications10.1016/j.jnca.2010.07.00634:1(1-11)Online publication date: 1-Jan-2011
  • (2010)Restricting Anti-Circumvention DevicesCybercrimes: A Multidisciplinary Analysis10.1007/978-3-642-13547-7_4(73-94)Online publication date: 16-Aug-2010
  • (2009)An Active Trusted Model for Virtual Machine Systems2009 IEEE International Symposium on Parallel and Distributed Processing with Applications10.1109/ISPA.2009.68(145-152)Online publication date: Aug-2009
  • (2009)On the Impossibility of Detecting Virtual Machine MonitorsEmerging Challenges for Security, Privacy and Trust10.1007/978-3-642-01244-0_13(143-151)Online publication date: 2009
  • (1975)Operating system penetrationProceedings of the May 19-22, 1975, national computer conference and exposition10.1145/1499949.1500018(361-368)Online publication date: 19-May-1975
  • (1973)Architecture of virtual machinesProceedings of the workshop on virtual computer systems10.1145/800122.803950(74-112)Online publication date: 26-Mar-1973
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media