Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
503 Oct 2013 - 15:31norqu036? 
427 Mar 2013 - 09:44NicLewis 
322 Mar 2013 - 14:34NicLewis 
225 Feb 2013 - 10:10NicLewis 
120 Feb 2013 - 10:28NicLewis 

Render style:     Context:


 History: r5 < r4 < r3 < r2 < r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>PubReportofIBMJointStudies (revision 5)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Report on the IBM Joint Data Security Studies

 

Data Security and Data Processing, Volumes 1-6 (seven pieces), Joint Study by IBM Corporation, Massachusetts Institute of Technology, TRW System, Inc., and the Management Information DIvision of the State of Illinois, IBM Publications G320-1370 through G320-1376, White Plains, NY: June 1974.

In 1972, IBM, MIT, the State of Illinois, and TRW Systems undertook a joint study on data security. One goal was to build a sound body of knowledge about computer system data security, enabling users and manufacturers to better understand the subject, problems, and priorities in computer data security. Another goal was to provide practical experience with the cost and operational impact of adding data security measures to existing installations. Each partner organization undertook slightly different tasks in the overall study, but each site utilized an experimental IBM software product called Resource Security System (RSS) to address problems with access control, integrity, and journaling.(1)

Volume 1 provides an introduction and outline of the project. Intended for management, volume 1 describes the basic concepts and issues in data security, and connects those concepts with the overall report.

Volume 2 summarizes the findings, and provides abstracts of the detailed reports. Volume 2 describes the primary reasons for the studies as: To build a body of knowledge on the subject, and to gain practical experience with data security in an actual data processing operation.

Volume 3 (in two parts) was produced by the State of Illinois. The Illinois state Department of Finance's Management Information Division became the test site for the study of both the economic impact of imposing security measures on existing installations, and also the privacy considerations of information security, as the Department of Finance must handle large volumes of personal information belonging to state citizens.

Volume 4 was conducted by MIT. The MIT study was of three parts: 1. The study of the general problem of access control, with an emphasis on authorization mechanisms for controlling the availability of data to individuals. 2. A survey of user needs for data security and of security awareness in the financial, medical, educational, and service bureau communities. 3. The Information Processing Center at MIT evaluated the study findings to produce a method of protecting data through data set access control.

Volume 5 was conducted by TRW, Inc. The TRW study concentrated on the analysis of the nature of various vulnerabilities of computing systems, on the complex problems of protecting computing systems against such vulnerabilities, on techniques that aid in developing and evaluating secure systems, and on the desirability of secure system certification.

Volume 6 was produced by IBM's Federal Systems Center (FSC). This final volume contains the FSC's study on the problems associated with installing a security system in an already operational environment, the FSC's information and control system facility in Gaithersburg, Maryland.

Additional Resources:

Notes

1 : http://www.worldcat.org/title/data-security-and-data-processing-volume-1-introduction-and-overview/oclc/4769477296?referer=one_hit


Topic revision: r5 - 03 Oct 2013 - 15:31:48 - norqu036
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback