The Protection of Information in Computer Systems

Total Page:16

File Type:pdf, Size:1020Kb

The Protection of Information in Computer Systems The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of Confinement protecting computer-stored information from unauthorized Allowing a borrowed program to have access to data, use or modification. It concentrates on those architectural while ensuring that the program cannot release the structures--whether hardware or software--that are information. necessary to support information protection. The paper Descriptor develops in three main sections. Section I describes A protected value which is (or leads to) the physical desired functions, design principles, and examples of address of some protected object. elementary protection and authentication mechanisms. Any Discretionary reader familiar with computers should find the first section (In contrast with nondiscretionary.) Controls on access to be reasonably accessible. Section II requires some to an object that may be changed by the creator of the familiarity with descriptor-based computer architecture. It object. examines in depth the principles of modern protection Domain architectures and the relation between capability systems The set of objects that currently may be directly and access control list systems, and ends with a brief accessed by a principal. analysis of protected subsystems and protected objects. Encipherment The reader who is dismayed by either the prerequisites or The (usually) reversible scrambling of data according the level of detail in the second section may wish to skip to to a secret transformation key, so as to make it safe for Section III, which reviews the state of the art and current transmission or storage in a physically unprotected research projects and provides suggestions for further environment. reading. Grant To authorize (q. v.). Hierarchical control Glossary Referring to ability to change authorization, a scheme in which the record of each authorization is controlled The following glossary provides, for reference, brief definitions by another authorization, resulting in a hierarchical for several terms as used in this paper in the context of protecting tree of authorizations. information in computers. List-oriented Access Used to describe a protection system in which each The ability to make use of information stored in a protected object has a list of authorized principals. computer system. Used frequently as a verb, to the Password horror of grammarians. A secret character string used to authenticate the Access control list claimed identity of an individual. A list of principals that are authorized to have access to Permission some object. A particular form of allowed access, e.g., permission to Authenticate READ as contrasted with permission to WRITE. To verify the identity of a person (or other agent Prescript external to the protection system) making a request. A rule that must be followed before access to an object Authorize is permitted, thereby introducing an opportunity for To grant a principal access to certain information. human judgment about the need for access, so that Capability abuse of the access is discouraged. In a computer system, an unforgeable ticket, which Principal when presented can be taken as incontestable proof The entity in a computer system to which authorizations that the presenter is authorized to have access to the are granted; thus the unit of accountability in a object named in the ticket. computer system. Certify Privacy To check the accuracy, correctness, and completeness The ability of an individual (or organization) to decide of a security or protection mechanism. whether, when, and to whom personal (or Complete isolation organizational) information is released. A protection system that separates principals into Propagation compartments between which no flow of information or control is possible. When a principal, having been authorized access to reservations for people whose names he can supply. A flight some object, in turn authorizes access to another boarding agent might have the additional authority to print out principal. the list of all passengers who hold reservations on the flights for Protected object which he is responsible. The airline might wish to withhold from A data structure whose existence is known, but whose the reservation agent the authority to print out a list of internal organization is not accessible, except by reservations, so as to be sure that a request for a passenger list invoking the protected subsystem (q.v.) that manages it. from a law enforcement agency is reviewed by the correct level Protected subsystem of management. A collection of procedures and data objects that is The airline example is one of protection of corporate information encapsulated in a domain of its own so that the internal for corporate self-protection (or public interest, depending on structure of a data object is accessible only to the one's view). A different kind of example is an online warehouse procedures of the protected subsystem and the inventory management system that generates reports about the procedures may be called only at designated domain current status of the inventory. These reports not only represent entry points. corporate information that must be protected from release outside Protection the company, but also may indicate the quality of the job being 1) Security (q.v.). done by the warehouse manager. In order to preserve his personal 2) Used more narrowly to denote mechanisms and privacy, it may be appropriate to restrict the access to such techniques that control the access of executing reports, even within the company, to those who have a legitimate programs to stored information. reason to be judging the quality of the warehouse manager's Protection group work. A principal that may be used by several different Many other examples of systems requiring protection of individuals. information are encountered every day: credit bureau data banks; Revoke law enforcement information systems; time-sharing service To take away previously authorized access from some bureaus; on-line medical information systems; and government principal. social service data processing systems. These examples span a Security wide range of needs for organizational and personal privacy. All With respect to information processing systems, used to have in common controlled sharing of information among denote mechanisms and techniques that control who multiple users. All, therefore, require some plan to ensure that the may use or modify the computer or the information computer system helps implement the correct authority structure. stored in it. Of course, in some applications no special provisions in the Self control computer system are necessary. It may be, for instance, that an Referring to ability to change authorization, a scheme externally administered code of ethics or a lack of knowledge in which each authorization contains within it the about computers adequately protects the stored information. specification of which principals may change it. Although there are situations in which the computer need provide Ticket-oriented no aids to ensure protection of information, often it is appropriate Used to describe a protection system in which each to have the computer enforce a desired authority structure. principal maintains a list of unforgeable bit patterns, The words "privacy," "security," and "protection" are frequently called tickets, one for each object the principal is used in connection with information-storing systems. Not all authorized to have access. authors use these terms in the same way. This paper uses User definitions commonly encountered in computer science literature. Used imprecisely to refer to the individual who is The term "privacy" denotes a socially defined ability of an accountable for some identifiable set of activities in a individual (or organization) to determine whether, when, and to computer system. whom personal (or organizational) information is to be released. This paper will not be explicitly concerned with privacy, but 1 instead with the mechanisms used to help achieve it. The term "security" describes techniques that control who may use or modify the computer or the information contained in it.2 I. BASIC PRINCIPLES OF INFORMATION PROTECTION Security specialists (e.g., Anderson [6] ) have found it useful to place potential security violations in three categories. 1) Unauthorized information release: an unauthorized person is A. Considerations Surrounding the Study of Protection able to read and take advantage of information stored in the computer. This category of concern sometimes extends to "traffic 1) General Observations: As computers become better analysis," in which the intruder observes only the patterns of understood and more economical, every day brings new information use and from those patterns can infer some applications. Many of these new applications involve both storing information content. It also includes unauthorized use of a information and simultaneous use by several individuals. The key proprietary program. concern in this paper is multiple use. For those applications in 2) Unauthorized information modification: an unauthorized which all users should not have identical authority, some scheme person is able to make changes in stored information--a form of is needed to ensure that the computer system implements the sabotage. Note that this kind of violation does not require that the desired authority structure.
Recommended publications
  • TCD-SCSS-T.20121208.032.Pdf
    AccessionIndex: TCD-SCSS-T.20121208.032 Accession Date: 8-Dec-2012 Accession By: Prof.J.G.Byrne Object name: Burroughs 1714 Vintage: c.1972 Synopsis: Commercial zero-instruction-set computer used by the Dept.Computer Science from 1973-1979. Just two prototyping boards survive. Description: The Burroughs 1714 was one of their B1700 family, introduced in 1972 to compete with IBM's System/3. The original research for the B1700 series, initially codenamed the Proper Language Processor or Program Language Processor (PLP) was done at the Burroughs Pasadena plant. The family were known as the Burroughs Small Systems, as distinct from the Burroughs Medium Systems (B2000, etc) and the Burroughs Large Systems (B5000, etc). All the Burroughs machines had high-level language architectures. The large were ALGOL machines, the medium COBOL machines, but the small were universal machines. The principal designer of the B1700 family was Wayne T. Wilner. He designed the architecture as a zero-instruction-set computer, an attempt to bridge the inefficient semantic gap between the ideal solution to a particular programming problem and the real physical hardware. The B1700 architecture executed idealized virtual machines for any language from virtual memory. It achieved this feat by microprogramming, see the microinstruction set further below. The Burroughs MCP (Master Control Program) would schedule a particular job to run, then preload the interpreter for whatever language was required into a writeable control store, allowing the machine to emulate the desired virtual machine. The hardware was optimised for this. It had bit-addressable memory, a variable-width ALU, could OR in data from a register into the instruction register (for very efficient instruction parsing), and the output of the ALU was directly addressable as X+Y or X-Y read-only registers.
    [Show full text]
  • 1. Types of Computers Contents
    1. Types of Computers Contents 1 Classes of computers 1 1.1 Classes by size ............................................. 1 1.1.1 Microcomputers (personal computers) ............................ 1 1.1.2 Minicomputers (midrange computers) ............................ 1 1.1.3 Mainframe computers ..................................... 1 1.1.4 Supercomputers ........................................ 1 1.2 Classes by function .......................................... 2 1.2.1 Servers ............................................ 2 1.2.2 Workstations ......................................... 2 1.2.3 Information appliances .................................... 2 1.2.4 Embedded computers ..................................... 2 1.3 See also ................................................ 2 1.4 References .............................................. 2 1.5 External links ............................................. 2 2 List of computer size categories 3 2.1 Supercomputers ............................................ 3 2.2 Mainframe computers ........................................ 3 2.3 Minicomputers ............................................ 3 2.4 Microcomputers ........................................... 3 2.5 Mobile computers ........................................... 3 2.6 Others ................................................. 4 2.7 Distinctive marks ........................................... 4 2.8 Categories ............................................... 4 2.9 See also ................................................ 4 2.10 References
    [Show full text]
  • M. Craig Weaver Society for Worldwide Interbank Financial
    M. Craig Weaver 106 Lakewood Drive Coatesville, PA 19320 (484) 712-0479 [email protected] S UMMARY Software Engineering professional with extensive experience in the design and development of system networking software and layered network architectures. A team-oriented communicator with the ability to solve complex problems using strong analytical skills. Effectively analyzed, designed and developed global networking software products on platforms ranging from micro, server, and mid-range to mainframe computers. Core strengths: • Software design, specification, and programming • Team Management • Software Quality Assurance Testing • Network troubleshooting and problem solution • Software problem analysis and solution • Burroughs Network Architecture expert • Complex protocol design and implementation • Networking and layered network architectures T E C H N I C A L S KILLS LANGUAGES JavaScript, C++, C, ALGOL, FORTRAN, HTML, Intel Assembler, Pascal, and others. PLATFORMS UNIX Systems; Microsoft Windows based systems (WINNT/WIN2000/WINXP); Unisys A-Series; Unisys V-Series; Unisys Clearpath; Unisys ES7000; Burroughs Large Systems; Burroughs Medium systems; Intel Processor based communications processor cards; Burroughs CP9500/B900. P ROFESSIONAL E XPERIENCE Society for Worldwide Interbank Financial Telecommunication (SWIFT) 2008 – 2014 International Member Owned Banking Cooperative Manassas, Virginia SENIO R SOFTWARE ENG INEER – CONTRACT FIN Renewal Project – Moving the SWIFT financial application software from Unisys machines (ALGOL) to HP UNIX machines (C++) • Tested ALTOS conversion tool. Created test cases from canonical ALGOL forms, converting them using ALTOS, then comparing the ALGOL and C++ test results. Diagnosed discrepancies and either designed solutions or required changes to the tool. • Converted Unisys ALGOL into UNIX C++ code. Tested, debugged and maintained the converted C++ code.
    [Show full text]
  • Classification of Computers
    Classification of Computers Computer systems used for business purposes can be divided in to three classes: Microcomputers, Minicomputers and Mainframe computers. Though these divisions are loosely based on the size of the computer systems, there are no hard and fast rules for deciding exactly where one category ends and the next begin. Hence the largest minicomputer systems are often larger than the smallest mainframe computers. The “size” of a computer system is dependent on the size of a computer’s hardware configuration, the nature of its applications, and the complexity of its system software. This helps us to classify a system as a microcomputer, minicomputer or mainframe. Irrespective of size, all computers consist of two basic types of components. Those are processors and input/output (I/O) devices. The processor consists of three parts: the Central Processing Unit, or CPU, main storage and device controllers. The CPU executes instructions, main storage stores instructions and data processed by the CPU and device controllers let the CPU and main storage connect to I/O devices. Note: Though all computer systems consist of three basic components, the way those components are combined for a particular computer system varies depending on the system’s requirements. Microcomputer or Personal Computer Microcomputer is primarily intended for stand-alone use by an individual. Microcomputers are small, single-user systems which provide a simple processor and just a few input/output devices. This system consists of a processor with 2 or 4 GB of main storage, a keyboard, a display monitor, a printer, and a diskette drive with a capacity of 4GB and a 500 GB of hard disk.
    [Show full text]
  • Sms208: Computer Appreciation for Managers
    SMS208: COMPUTER APPRECIATION FOR MANAGERS NATIONAL OPEN UNIVERSITY OF NIGERIA SMS 208 COMPUTER APPRECIATION FOR MANAGERS COURSE GUIDE SMS 208 COMPUTER APPRECIATION FOR MANAGERS Course Developer Gerald C. Okeke Eco Communication Inc. Ikeja, Lagos Course Editor/Coordinator Adegbola, Abimbola Eunice National Open University of Nigeria Programme Leader Dr. O.J. Onwe National Open University of Nigeria NATIONAL OPEN UNIVERSITY OF NIGERIA 2 SMS 208 COMPUTER APPRECIATION FOR MANAGERS National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salaam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published by National Open University of Nigeria 2008 Printed 2008 ISBN: 978-058-198-7 All Rights Reserved 3 SMS 208 COMPUTER APPRECIATION FOR MANAGERS CONTENTS PAGE Introduction………………………………………………….. 1 Course Objectives…………………………………………… 1 Credit Units………………………………………………….. 2 Study Units………………………………………………….. 2 Course Assessment………………………………………….. 2 Introduction This course is designed to avail managers in business, governance and education with what computer is and its applications in carrying out their every day assignments. This course goes on to acquaint them with the basic component parts of a personal computer and the types available. The emphasis is for them to understand the application of computer in information technology and in information communications technology that translates to effectiveness and efficiency in business and
    [Show full text]
  • Unisys Mainframe to Microsoft Azure Redesign 03
    THE MAINFRAME TO CLOUD EXPERTS Unisys to Azure Reference Architecture Astadia Mainframe-to-Cloud Modernization Series Unisys to Azure Reference Architecture Abstract In businesses today, across all market segments, cloud computing has become the focus of current and future technology needs for the enterprise. The cloud offers compelling economics, the latest technologies and platforms, and the agility to adapt your information systems quickly and efficiently. However, many large organizations are burdened by much older, previous generation platforms, typically in the form of a mainframe computing environment. Although old and very expensive to maintain, the mainframe platform continues to run the most important information systems of an organization. The purpose of this reference architecture is to assist business and IT professionals as they prepare plans and project teams to start the process of moving mainframe-based application portfolios to Microsoft Azure. We will also share various techniques and methodologies that may be used in forming a complete and effective Legacy Modernization plan. In this document, we will explore: • Why modernize a mainframe • The challenges associated with mainframe modernization • An overview of the Unisys mainframe • The Unisys to Azure Reference Architecture • An overview of Azure services • A look at the Astadia Success Methodology This document is part of the Astadia Mainframe to Cloud Modernization Series that leverages Astadia’s 25+ years of mainframe platform modernization expertise. THE MAINFRAME TO CLOUD EXPERTS © 2017 Astadia. Inc. - All rights reserved. 12724 Gran Bay Parkway, Suite 300 Jacksonville, FL 32258 All other copyrights and trademarks the property of their respective owners. Unisys to Azure Reference Architecture Contents Introduction ...........................................................................................................................
    [Show full text]
  • Progress Report. 1 January 1981 - 31 December 1982
    Downloaded from orbit.dtu.dk on: Sep 26, 2021 Progress Report. 1 January 1981 - 31 December 1982. Computer Installation Risø National Laboratory, Roskilde Publication date: 1983 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Risø National Laboratory, R. (1983). Progress Report. 1 January 1981 - 31 December 1982. Computer Installation. Danmarks Tekniske Universitet, Risø Nationallaboratoriet for Bæredygtig Energi. Risoe-M No. 2374 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. RISØ-M-2374 PROGRESS REPORT 1 JANUARY 1981 - 31 DECEMBER 1982 COMPUTER INSTALLATION Abstract. This report describes selected parts of the activities at the Computer Installation of Risø National Laboratory in 1981 and 1982. Information given may be preliminary. INIS descriptors: BURROUGHS COMPUTERS; RISØ NATIONAL LABORATORY UDC 681.322 UDC 061.62 Risø National Laboratory May :983 Risø National Laboratory, DK 4000 Roskilde, Denmark ISBN 87-550-0910-7 ISSN 0418-6435 Risø Repro 1983 - 3 - CONTENTS Page 1.
    [Show full text]
  • Modern Computers Date to the Mid-20Th Century (19401945), Although the Computer Concept and Various Machines Similar to Computers Existed Earlier
    1 www.onlineeducation.bharatsevaksamaj.net www.bssskillmission.in INTRODUCTION TO OPERATING SYSTEM Topic Objective: At the end of this topic student would be able to: Understand the Computer Understand the History of computing Understand the Stored program architecture Understand the Programs Definition/Overview: NLS, or the "oN-Line System", was a revolutionary computer collaboration system designed by Douglas Engelbart and the researchers at the Augmentation Research Center (ARC) at the Stanford Research Institute (SRI) during the 1960s. The NLS system was the first to employ the practical use of hypertext links, the mouse (co-invented by Engelhard and colleague Bill English), raster-scan video monitors, information organized by relevance, screen windowing, presentation programs, and other modern computing concepts. Key Points: 1. Computer A computer is a machine that manipulates data according to a list of instructions. The first devices that resembleWWW.BSSVE.IN modern computers date to the mid-20th century (19401945), although the computer concept and various machines similar to computers existed earlier. Early electronic computers were the size of a large room, consuming as much power as several hundred modern personal computers (PC). Modern computers are based on tiny integrated circuits and are millions to billions of times more capable while occupying a fraction of the space. Today, simple computers may be made small enough to fit into a wristwatch and be powered from a watch battery. Personal computers, in various forms, are icons of the Information Age and are what most people think of as "a computer"; however, the most common form of computer in use today is the embedded computer.
    [Show full text]
  • Bsp Burroughs Scientific Processor
    BURROUGHS SCIENTIFIC PROCESSOR CONTROL PROGRAM SSP BURROUGHS SCIENTIFIC PROCESSOR CONTENTS Page ABSTRACT D-v 1. BACKGROUND D-l 2. FUNCTIONAL REQUIREMENTS D-3 3. FUNCTIONAL CHARACTERISTICS D-5 Computational Envelope D-5 Functional Distribution D-6 Monoprogramming D-6 Planned Overlay D-6 Integra ted Job Flow D-6 4. JOB FLOW D-7 5. WORK FLOW LANGUAGE D-ll 6. SCHEDULING AND OPERATOR CONTROL D-15 7. FILE MEMORY ALLOCATION D-17 8. PROCESSOR MEMORY ALLOCATION D-19 9. SUMMARY D-23 D-iii ~~p ~~~~~~~~~~~~~~~~~~~~BURROUGHSSCIENTIFICPROCESSOR BSP BURROUGHS SCIENTIFIC PROCESSOR ABSTRACT The control program for the Burroughs Scientific Processor exploits functional distribution to provide a full-featured batch and time-sharing operating system for general-purpose and interaction-intensive computing~ while providing an efficient monoprogramming environment for high-speed~ parallel~ numerical computation. Efficiency is obtained by incorporating physical 110 functions into the I/O controller and performing most scheduling functions on the separate sys­ tem manager. The inefficiency of demand-paged virtual memory is avoided while retaining its user convenience by providing static memory allocation and overlay coupled with a sophisticated linker that estimates working sets via source program analysis. Finally~ the scientific environment is integrated into a general purpose system via Burroughs high-level job control language and multiclass priority scheduling system. D-v ~~p ~~~~~~~~~~~~~~~~~~~~-BURROUGHSSCIENTIFICPROCESSOR SSP BURROUGHS SCIENTIFIC PROCESSOR 1. BACKGROUND The development of the Master Control Program (MCP) for the Burroughs B 5000 in 1961 marked the beginning of the present generation of operating systems, pro­ viding as it did full support for multiprocessing, virtual memory, time-sharing, and a host of other system and user conveniences that have since become common­ place throughout the industry.
    [Show full text]
  • Open PDF in New Window
    Y-DIGITALEWSLETTER COMPUTER, il OFFICEF OF NAVAL RESEARCU - MATNEMATICAL SCIENCES DIVISION O Vol. 17, No. 1 Gordon D. Goldstein, Editor January 1965 Margo A. Sass, Associate Editor Judyv E. Ceasar, Editorial Assistant Judy A. Hetrick, Editorial Assistant CONTENTS N EDITORIAL POLICY NOTICES • 1. Editorial Z. Contributions 1 3. Circulation I COMPUTERS AND DATA PROCESSORS, NORTH AMERICA I. Burroughs Corporation, Burroughs B5500, Detroit, Michigan 48Z3Z 2 Z. International Business Machines Corporation. IBM System/360 Model 92, White Plains, New York 10601 4 3. International Business Machines Corporation. Program Support for IBM System/360, White Plains, New York 10601 4 4. The National Cash Register Go., NCR 315 RMG (Rod Memory Computvr) Dayton 9, Ohio 7 COMPUTING CENTERS 1. National Library of Medicine, MEDLARS--Information Retrieval System, Washington Z5, D. C. 10 2. University of Toronto# Institute of Computer Science, IBM 7094 Model I1, Ontario, Canada C. 3. U.S. Air Force Academy, Seiler Research Laboratory, Burroughs B5000 for Research and Cadet Training, Colorado Springs, Colorado 11 4. U.S. Navy Electronics Laboratory, NEL Systems Support Center, San Diego, California 92152 13 COMPUTERS AND CENTERS, OVERSEAS I. The English Electric Company Limited, Integrated Production Control Using Digital Computers. London, W.C.Z, England 14 Z. Laboratorio Di Ricerche Elettroniche, C. Olivetti & C. S.p.A., ELA 4001 System, Milan, Italy 18 3. University of Sydney, School of Physics, The Basser Computing Department. Sydney, N.S.W., Australia 19 MISCELLANEOUS 1. Cornell Aeronautical Laboratory, Inc., Forecasting Solar Flares, Buffalo Z1, New York /1 2. Board of Governors of the Federal Reserve System, COBOL Usage, Washington, D.
    [Show full text]
  • Company Backgrounders : the Ultimate Corp
    The Ultimate Corp. 717 Ridgedale Avenue East Hanover, New Jersey 07936 Telephone: (201) 887-9222 Fax: (201) 887-6139 Dun's Number: 09-497-2445 Date Founded: 1978 CORPORATE STRATEGIC DIRECTION During fiscal years 1990, 1989, and 1988, R&D expenditure was $5.8 million, $6.7 million, and $5.5 million, respectively. These figures respectively The Ultimate Corp. maikets and distributes worksta­ represented 2,8, 3.3, and 2.6 percent of total revenue. tions and midrange computer systems designed for R&D activities are directed toward enhancement of business database management Ultimate also markets the performance and functionality of Ultimate's oper­ a line of software products for its operating systems. ating system software and in^lementation of such In May 1990, the Company was officially organized software on a broader range of hardware. R&D into four operating divisions: Systems, Customer activities also focus on the refinement of Ultimate's Service, Professional Services, and Financial Serv­ version of the PICK operating system and toward the ices. The Systems Division is responsible for world­ Conq>any's new strategic platforms. wide sales of minicomputer systems designed for database management These systems feature the Ultimate Operating System, the Con^any's enhanced More detailed information is available in Tables 1 version of the PICK operating system. This division through 3, which appear after "Business Segment is also responsible for the worldwide distribution of Strategic Direction" and present corporate highlights vertical-niche applications software through indepen­ and revenue by region and distribution channel. dent and Company-owned dealers. The Customer Table 4, a comprehensive financial statement, is at the Service Division is responsible for all contract service end of diis backgrounder.
    [Show full text]
  • Resume of David A. BAYLY
    Resume of David A. BAYLY Telephone: +44(7970)417 038 (mobile) Address: 41 Jacoby Place, Priory Road Edgbaston, Birmingham B5 7UN, U.K. email: [email protected] Date of birth: 15th August 1947 in Port Lincoln, Australia. Citizenship: Australian Marital status: single Visa status: in United Kingdom: Patriality (Can enter and work freely). Foreign languages: Can read and speak French. Qualifications: In EDP, usually as a Systems Programmer and/or Software Architect since 1967, professionally since 1972, as an employee, independent consultant and owner–employee of a software house. Have worked in Australia, Europe, USA and South Africa. Led several commercial software projects. Taught numerous classes in Advanced Programming and Operations Automation. Since 1986, increasing interest and emphasis on Macintosh computers and since 1994, with the Internet and the World Wide Web. 1997-now Macintosh development work (Frontier,Javascript, C& SQL). NAP support contracts for Unisys. System support for Unisys . 1996-1997 Consultant to Operations Department at Orange plc,UK NAP user. 1995-1996 Participated in start-up of a commercial Internet Web server company in Zürich Switzerland. Set up Macintosh Internet server and created SQL database and its interface to the World Wide Web (WWW). See <http://www.udena.ch/jobsurf/>. 1994 Architect and implementor for Unisys at Nynex, Boston - the NAP Expansion project, a network of NAP A Series mainframes. 1991–1993 Worked for Unisys on A Series mainframes in Switzerland, Pennsylvania and Boston. OA&M Architect for their Network Application Platform, a mainframe telecommunications node. 1986–1990 Programmer and consultant on Apple Macintosh personal computers. Designed, wrote and published an off-line reader for the COSY conference system (BIX version).
    [Show full text]