phenomenon: the deeper we search, the worse we play. Using a probabilistic game model, this paper examines the nature of this distortion, quantifies its magnitude, determines the conditions when its damage is curtailed and explains w h y search-depth pathology (the extreme manifestation of minimax distortion) is rarely observed in common games (Artificial Intelligence 21, 1 (1983)).
Methodology for Security Analysis of DataProcessing Systems
networks are particularly vulnerable with reliance placed on the software system to secure documents. The weakest configuration in distributed word processing systems is in moderate size networks which cannot justify sophisticated hardware to support sophisticated operating systems and security software. Therefore, either additional physical security for each terminal or a more sophisticated authorization routine must be provided. The first is nearly impossible and the second rarely exists on these systems. As the trend toward hard disks for these units continues, the best solution may be the inclusion of a cryptographic routine (Computers ~ Security 1 (1983)).
by John M. Carroll and Oi-Lun Wu Use of the logic programming language PROLOG assists in tracking functional relationships through complex networks to ensure that all products receive a security classification consistent with the operative security model. The language also permits computing work factors for data products. In some cases, these work factors may modify the levels of protection required (Computers ~ Security 1 (1983)).
Computer Security: Observations on the State of the Technology
Effective Information System Security with Password Controls by Charles Cresson Wood Password systems are a first line of defense that can prevent, deter, and detect abusive acts. They are one of the most cost effective computer resource control mechanisms presently available. This piece explores some of the more salient aspects of password system design, including objectives of password controls, design philosophies, man-machine interface design system administration and technical system implementation (Computers Et Security 1 (1983)).
by William 14. Murray Far more progress has been made in introducing new technology for audit, control and security over the past five years than has been in applying it. The lag in application stems in part from the lack of knowledge about the technology. This paper will address advances in share storage, privileged instructions, use of registers, authorization mechanisms, journals and logs, end-user authentication, external controls, cryptography, transaction-driven systems and application development. For each of these categories it will address the audit, control and security uses of the advances (Computers ~ Security 1 (1983)).
Securing the Distributed Word Processing Network by David R. Callaghan There has been little concern for the security of stand-alone and shared-logic word processor systems although the threats are there and the loss from breaches of security can be very expensive. Word processors usually store processed information rather than data and modification or destruction of a document can lead to poor or delayed decisions. Inherent controls of paper-based systems are lost when the typing function is automated. Word processing 50
of the developments in micro-electronic technology. This is bringing about a transformation not only in hardware, in the form of computer-aided manufacturing, but in the manner in which production is organised and controlled. It is in the latter connection that the present paper sets out to review current developments and future trends. In particular the machine readable bar-code is seen as a key element in extending computerised control to cover not only the machines, but tools, materials and parts and their movement in the development of fully integrated manufacturing sytems. As the move towards automation gathers pace it is forecast that manufacturing industry will become more process industry like in form, with consequences for the way in which production is organised and controlled. Finally consideration is given to the manner in which these current developments in the field of production are giving rise to a structural alteration in industrial labour requirements in which, in the future, fewer people will be required but on highly enriched work tasks (Computers in Industry (1983)).
On Ordering requests to Servers in a Distributed System by Alfredo R. Piquer
Unique Approach to Security Evaluation by Nigel Backwith The growth of on-line, real-time and distributed systems increases accessibility and vulnerability of company data and systems to the public and company users. A frequent concern is the security of a specific asset. The focus of this article is a methodology for evaluating the security of specific company assets. The Information and Systems Security Evaluation Methodology (ISSEM) was established to meet the need for a rigorous and thorough methodology in this area. The documentation produced serves as a basis for evaluating continuing changes to the control procedures as business conditions and related risks change. ISSEM has proved to be a meaningful tool to aid in monitoring and evaluating security on a continuing basis (Computers ~ Security 1. (1983)).
Production Control: Current Developments and Future Trends
A process offering a service in a distributed system receives request messages from client processes. For proper system behavior, it is often necessary for requests to be serviced in the same order that they are sent. Ensuring this order requires an eleborate scheme, unless certain restrictions are imposed on the distributed sytem. We present some restrictions that ensure that requests are received at a server in the same order that they are sent. With these restrictions, each server can safely service requests in the order of arrival. The restrictions either apply to the message routing, or to the client/server communication. The restrictions on message routing are often satisfied by systems based on local networks, and the restrictions on client/server communication are satisfied by some existing message passing schemes (Computer
Networks (1983)).
An Acknowledging Contention Algorithm Suitable For Local Radio Networks
by J.R. King
by Michael A. Malcolm, Lawrence D. Rogers and John E. Spracklen
Manufacturing industry is going through a period of unprecedented change as a result
We present a contention transmission algorithm for local networks which is related