scispace - formally typeset
Search or ask a question

Showing papers on "Vulnerability (computing) published in 1967"


Proceedings ArticleDOI
18 Apr 1967
TL;DR: A discussion of the threat to information privacy in non-military information systems, applicable countermeasures, and system implications of providing privacy protection is presented.
Abstract: Recent advances in computer time-sharing technology promise information systems which will permit simultaneous on-line access to many users at remotely located terminals. In such systems, the question naturally arises of protecting one user's stored programs and data against unauthorized access by others. Considerable work has already been done in providing protection against accidental access due to hardware malfunctions or undebugged programs. Protection against deliberate attempts to gain access to private information, although recently discussed from a philosophical point of view, has attracted only fragmentary technical attention. This paper presents a discussion of the threat to information privacy in non-military information systems, applicable countermeasures, and system implications of providing privacy protection.

66 citations


Journal ArticleDOI
TL;DR: The main objective of this paper is to show under what conditions asymptotic expression for vulnerability can be derived.
Abstract: A communication system can often be represented as an interconnection of stations and links. The assumption is that the system is subject to enemy attack aimed at isolating stations from each other. Vulnerability criteria are defined, and asymptotic and recurrence relations are given for computing the vulnerability of several classes of networks with a large number of stations. Based on the analysis procedures, optimum synthesis procedures are suggested. A simple model is analyzed first, then the results of the analysis are extended to include systems with repair, memory, and to those whose interconnections depend on distance. The main objective of this paper is to show under what conditions asymptotic expression for vulnerability can be derived.

27 citations


ReportDOI
01 Mar 1967
TL;DR: In this paper, the operations and equipment used in transferring vehicle loads between two vehicles or between a vehicle and a terminal are examined for seven different classes of cargo, and the usual method of load transfer is discussed, and expedient methods that could be used in a post-attack situation are suggested.
Abstract: : The operations and equipment used in transferring vehicle loads between two vehicles or between a vehicle and a terminal are examined for seven different classes of cargo. For each of these classes, the usual method of load transfer is discussed, and expedient methods that could be used in a postattack situation are suggested. St. Louis, Missouri is used to illustrate the problem of moving cargo through a damaged area after a nuclear attack. Several alternative methods of moving cargo via multiple transportation modes are analyzed, and a simple procedure for determining the minimum-time route among the alternatives is proposed. The transportation resources required to deliver the minimum supplies for survivor support in the St. Louis area are analyzed for different mixes of trains and trucks and for movements of the supplies over a range of distances. A general summary of the vulnerability of each transportation mode to nuclear attack is provided, and the remedial actions that might be taken in the preattack period to enhance postattack capability are discussed.

3 citations


Proceedings ArticleDOI
18 Jul 1967
TL;DR: In this article, the authors defined techniques to determine an index of system effectiveness for a particular deployment of a military organization in a given tactical disposition, which can reflect with the required precision the performance of the RF communications system as related to the task of its military unit.
Abstract: The techniques defined in the paper enable one to determine an index of system effectiveness for a particular deployment of a military organization in a given tactical disposition. This index will reflect with the required precision the performance of the RF communications system as related to the task of its military unit. Under certain conditions, these techniques may be extended to any communication system where questions of compatibility or vulnerability arise.. The first condition is that there exists for any link in the system a measure of the ability that the given link will perform in the required manner; that is, transmit the necessary information or provide a specific level of service quality. The second condition is that the relative importance of the various links may be assessed with a reasonable degree of accuracy. Such an index allows the rapid assessment of the effect of changes in individual elements of the system on total system performance. It is particularly helpful for changes that tend to improve some areas while degrading others.

1 citations