scispace - formally typeset
Search or ask a question

Showing papers on "Shared resource published in 1971"


Proceedings ArticleDOI
16 Nov 1971
TL;DR: A little over three years ago the Advanced Research Projects Agency began implementation of an entirely new venture in computer communications: a network that would allow for the interconnection, via common-carrier circuits, of dissimilar computers at widely separated, ARPA-sponsored research centers.
Abstract: A little over three years ago the Advanced Research Projects Agency of the Department of Defense (ARPA) began implementation of an entirely new venture in computer communications: a network that would allow for the interconnection, via common-carrier circuits, of dissimilar computers at widely separated, ARPA-sponsored research centers. This network, which has come to be known as the ARPA Network, presently includes approximately 20 nodes and is steadily growing. Major goals of the network are (1) to permit resource sharing, whereby persons and programs at one research center may access data and interactively use programs that exist and run in other computers of the network, (2) to develop highly reliable and economic digital communications, and (3) to permit broad access to unique and powerful facilities which may be economically feasible only when widely shared.

81 citations


Proceedings ArticleDOI
01 Jan 1971
TL;DR: In this paper, the authors discuss flow control in a resource sharing computer network, where the network resources consist of a set of inhomogeneous computers called Hosts that are geographically distributed and are interconnected by a store-and-forward communications subnet.
Abstract: In this paper we discuss flow control in a resource-sharing computer network (1). The network resources consist of a set of inhomogeneous computers called Hosts that are geographically distributed and are interconnected by a store-and-forward communications subnet. Each Host is connected to a store-and-forward switching node called an Interface Message Processor or an IMP, which is located on or nearby its premises (2). IMPs are then interconnected by leased synchronous communication circuits to form the subnet.

26 citations


Proceedings ArticleDOI
11 Nov 1971
TL;DR: A model is developed in which the requirements for access of objects to other objects are contained, in order to devise a conceptual framework for actual design of an access control system.
Abstract: The problems of authorization for a multiple-user resource sharing data processing system are discussed. The requirements for access of objects to other objects are covered in some detail. A model is then developed in which the above requirements are contained, in order to devise a conceptual framework for actual design of an access control system.

11 citations


Journal ArticleDOI
01 Apr 1971-Infor
TL;DR: Several potential threats to the security of information in resource-sharing computer systems are reviewed together with measures that may be utilized to counter them and general results of in-house attacks on an actual time-sharing system are reported.
Abstract: Several potential threats to the security of information in resource-sharing computer systems are reviewed together with measures that may be utilized to counter them. Some general results of in-house attacks on an actual time-sharing system are reported as well as conclusions drawn from a nationwide survey of the security provisions of computer utilities. Specific security measures are suggested for systems designed to have high, moderate, or low protection.

4 citations