Loading…

On data secure computer networks

Recent research activities concerned with computer network security have produced a number of proposals for secure network designs. If one considers only the data security problem, and a network's contribution to it, then the recent progress suggests that reasonable solutions will soon be avail...

Full description

Saved in:
Bibliographic Details
Published in:Operating systems review 1975-07, Vol.9 (3), p.59-62
Main Author: Popek, Gerald J.
Format: Article
Language:English
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c1130-88c0649c08db86bdfbe1528aad114ec9f618bd697ee80e3c2cf99bc3318f2d663
cites
container_end_page 62
container_issue 3
container_start_page 59
container_title Operating systems review
container_volume 9
creator Popek, Gerald J.
description Recent research activities concerned with computer network security have produced a number of proposals for secure network designs. If one considers only the data security problem, and a network's contribution to it, then the recent progress suggests that reasonable solutions will soon be available. These solutions will be economical and merge reasonably well with existing network practices.
doi_str_mv 10.1145/563905.810901
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_29445960</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>29445960</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1130-88c0649c08db86bdfbe1528aad114ec9f618bd697ee80e3c2cf99bc3318f2d663</originalsourceid><addsrcrecordid>eNotjztPwzAURj2A1FI6smdiS7k3jo09ooqXVKkLzJZzfS0V8sJOhPj3FIXpW44-nSPEDcIOsVZ3SksLamcQLOCFWANqWSprYCWucv4AQIMa16I49kXwky8y05y4oKEb54lT0fP0PaTPfC0uo28zb_93I96fHt_2L-Xh-Py6fziUhCihNIZA15bAhMboJsSGUVXG-3DWYbJRo2mCtvfMBlhSRdHahqREE6ugtdyI2-V3TMPXzHly3SkTt63veZizq2xdK6vhDJYLSGnIOXF0Yzp1Pv04BPfX7pZ2t7TLXyzTTJI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>29445960</pqid></control><display><type>article</type><title>On data secure computer networks</title><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>Popek, Gerald J.</creator><creatorcontrib>Popek, Gerald J.</creatorcontrib><description>Recent research activities concerned with computer network security have produced a number of proposals for secure network designs. If one considers only the data security problem, and a network's contribution to it, then the recent progress suggests that reasonable solutions will soon be available. These solutions will be economical and merge reasonably well with existing network practices.</description><identifier>ISSN: 0163-5980</identifier><identifier>DOI: 10.1145/563905.810901</identifier><language>eng</language><ispartof>Operating systems review, 1975-07, Vol.9 (3), p.59-62</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1130-88c0649c08db86bdfbe1528aad114ec9f618bd697ee80e3c2cf99bc3318f2d663</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Popek, Gerald J.</creatorcontrib><title>On data secure computer networks</title><title>Operating systems review</title><description>Recent research activities concerned with computer network security have produced a number of proposals for secure network designs. If one considers only the data security problem, and a network's contribution to it, then the recent progress suggests that reasonable solutions will soon be available. These solutions will be economical and merge reasonably well with existing network practices.</description><issn>0163-5980</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1975</creationdate><recordtype>article</recordtype><recordid>eNotjztPwzAURj2A1FI6smdiS7k3jo09ooqXVKkLzJZzfS0V8sJOhPj3FIXpW44-nSPEDcIOsVZ3SksLamcQLOCFWANqWSprYCWucv4AQIMa16I49kXwky8y05y4oKEb54lT0fP0PaTPfC0uo28zb_93I96fHt_2L-Xh-Py6fziUhCihNIZA15bAhMboJsSGUVXG-3DWYbJRo2mCtvfMBlhSRdHahqREE6ugtdyI2-V3TMPXzHly3SkTt63veZizq2xdK6vhDJYLSGnIOXF0Yzp1Pv04BPfX7pZ2t7TLXyzTTJI</recordid><startdate>197507</startdate><enddate>197507</enddate><creator>Popek, Gerald J.</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>197507</creationdate><title>On data secure computer networks</title><author>Popek, Gerald J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1130-88c0649c08db86bdfbe1528aad114ec9f618bd697ee80e3c2cf99bc3318f2d663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1975</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Popek, Gerald J.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Operating systems review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Popek, Gerald J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On data secure computer networks</atitle><jtitle>Operating systems review</jtitle><date>1975-07</date><risdate>1975</risdate><volume>9</volume><issue>3</issue><spage>59</spage><epage>62</epage><pages>59-62</pages><issn>0163-5980</issn><abstract>Recent research activities concerned with computer network security have produced a number of proposals for secure network designs. If one considers only the data security problem, and a network's contribution to it, then the recent progress suggests that reasonable solutions will soon be available. These solutions will be economical and merge reasonably well with existing network practices.</abstract><doi>10.1145/563905.810901</doi><tpages>4</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0163-5980
ispartof Operating systems review, 1975-07, Vol.9 (3), p.59-62
issn 0163-5980
language eng
recordid cdi_proquest_miscellaneous_29445960
source Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)
title On data secure computer networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T17%3A46%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20data%20secure%20computer%20networks&rft.jtitle=Operating%20systems%20review&rft.au=Popek,%20Gerald%20J.&rft.date=1975-07&rft.volume=9&rft.issue=3&rft.spage=59&rft.epage=62&rft.pages=59-62&rft.issn=0163-5980&rft_id=info:doi/10.1145/563905.810901&rft_dat=%3Cproquest_cross%3E29445960%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c1130-88c0649c08db86bdfbe1528aad114ec9f618bd697ee80e3c2cf99bc3318f2d663%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=29445960&rft_id=info:pmid/&rfr_iscdi=true