scispace - formally typeset
Search or ask a question

Showing papers on "Vulnerability (computing) published in 1975"


Journal ArticleDOI
01 Nov 1975
TL;DR: This paper defines security policies and protection mechanisms precisely and bridges the gap between them with the concept of soundness: whether a protection mechanism enforces a policy.
Abstract: Security policies define who may use what information in a computer system. Protection mechanisms are built into a system to enforce security policies. In most systems, however, it is quite unclear what policies a mechanism can or does enforce.This paper defines security policies and protection mechanisms precisely and bridges the gap between them with the concept of soundness: whether a protection mechanism enforces a policy. Different sound protection mechanisms for the same policy can then be compared. We also show that the “union” of mechanisms for the same program produces a more “complete” mechanism. Although a “maximal” mechanism exists, it cannot necessarily be constructed.

58 citations


01 May 1975
TL;DR: The United States is in the process of developing energy policies that will lead to a greater degree of energy self-sufficiency, and to a reduced level of vulnerability to interruption of supply from abroad.
Abstract: As a result of recent disruption in the world petroleum market and rapid price increases, the United States is in the process of developing energy policies that will lead to a greater degree of energy self-sufficiency, and to a reduced level of vulnerability to interruption of supply from abroad.

6 citations


Proceedings ArticleDOI
19 May 1975
TL;DR: The United States is in the process of developing energy policies that will lead to a greater degree of energy self-sufficiency, and to a reduced level of vulnerability to interruption of supply from abroad.
Abstract: As a result of recent disruption in the world petroleum market and rapid price increases, the United States is in the process of developing energy policies that will lead to a greater degree of energy self-sufficiency, and to a reduced level of vulnerability to interruption of supply from abroad.

4 citations


01 Sep 1975
TL;DR: In this paper, the authors examined certain aspects of the military use of LH2 as an alternate fuel for use in large military aircraft, including availability, cost, implications for aircraft design, mission capability, safety, and fuel tank vulnerability in a military threat environment.
Abstract: : This report examines certain aspects of the military use of LH2 as an alternate fuel for use in large military aircraft. These aspects include availability, cost, implications for aircraft design, mission capability, safety, and fuel tank vulnerability in a military threat environment. It is concluded that vulnerability in a military threat environment is the major topic which requires further attention in a comprehensive manner although some additional investigation will also be required in other topical areas.

1 citations