CS551: Security and Privacy on the Internet, Fall 2000
Lectures |
Manifests |
Problem Sets |
Projects |
Midterm |
Final |
Resources |
Syllabus |
Challenges |
Calendar
|
1A thorough and scholarly discussion of the concept of privacy may be found in [1], and an interesting study of the impact of technology on privacy is given in [2]. In 1973, the U.S. Department of Health Education, and Welfare published a related study [3]. A recent paper by Turn and Ware [4] discusses the relationship of the social objective of privacy to the security mechanisms of modern computer systems.13Also called the master/slave bit, or supervisor/user bit.
17As shown later, in a computer system, descriptors can be used on the tickets.
30Imagery inspired by Lampson [30].
37We have thus merged, for speed, the protection descriptor and the addressing descriptor.