Coecim\F 11 -~ 12 655 33'4 31 331/.- 1/2

Total Page:16

File Type:pdf, Size:1020Kb

Coecim\F 11 -~ 12 655 33'4 31 331/.- 1/2 NOVEMBER 3, 1980 111\'2-1 6 18 323,i, 32'" 32118-:je an Gas 1.96 8 69 20 19~, 1934- 'I. l..opeIIICI .I" "U1 ''I FIlIPwI' :£.411 I 1/, JU'/2 '1'1\'2 XJU'II­ 5 88 15 14'A1 14'h ...... CinciMH .90 8 252 28 2634 27~-1:tt Ccpwld 1.28 I 2 18'12 18'12- '4 E FllP\..it 2.08 6 334 26~ 2614 26'12- =III 6 175 351f2 341J. 3511. ...... or Fill 2.40 7 129 29~ r29 29~- lie Corckwa .30 10 320 4 3la- ',II ESystm 1.20 22'frt- ~ F1aStei UO 6 11 15 243J& 25 - '4 .U 1434- =III ... 227 27=111 26~ 27 ...... Citicorp 1.16 72898 25'1. 23=111 p24la- ~ Corelnd EaglePc .76 AIor 1.20 8 267 35'" 34'4 3434- ~ CornG 1.688 ~-'I. .... 5 48¥e 48la 48?'e+!fa CitiesSy 3.20 7 318 54 53 531f.- J',~ 54'4+13Jo Easco 1.10 191f2- I~ FMC 1.20 6 269 24 221h p23¥a+ 'AI Corcrill 1.24 213J&-134 13 282 10'/. r8¥a 10 + 'I. CitytnYest 1 31056 I~ J21,'.1 gl~+ "It Eastern Air p91f2+ ~ FMCpf 2'4 .... 134 34 34 ...... 8 63 22lh r2J11. 21'4-1=111 City Illy wts .... 326 Pie 1 Pie ...... ~-'!iI EasApf 2.69 233Jo ..... FooteC UO 6 56 19=111 18'" 18'1.-1 10 392 13 12'4 12~- I/a City lily pf 2 .... 110 22lh r21 22lh- 34 ~C~~ 17!M1- 'I. EastGsF .80 13:tt .... .. FordMo 3.60 32091 41 rH 4O¥a- 'Ie 3 1 I CUA 5;ll .I;~ 4'J'."'-H~ EastUtI 1.60 15 - '11 Fr McK 1.24 5 156 18'/2 17'12 p18=111- ~ 743 24 4 23'A1 23'h-l~ City!. pf 1.31 ... 3 26 /2 26'12 26 h-5'12 CPOItI 2.70 8 182 21 191,1. 21 - Ih Oarke~ 2 6 106 35'1. 34lJ, 343,1e-l 48 - ',~ EastmKo 2a S8¥11+1'h FoMcpI 1.80 .... 26 29 2734 29 - la I.U =III 1 11'1.- 3,Ie CPNati 16=111+ Eaton 2.25 353Jo- 'I. FtDBrn 1.24 .... 22 13'1. 13V. 131J. .. .... 8 121 26718 251;{o 26 .4-2 0ark0il.6O 7 78 113,1e IJIla CraigCp 9-/.-1'12 .... z..o SS3J& 55~ 5534-2'4 CLC Am .24 .... 122 931. 9'/, ~- 34 .so Eatonpf 1.19 35 -3 FotHow .% 12 79 39 38'.1. 39 + V. 3 25 - '/, EchInM .72 30'1.- 3.It FosterWl la 7 390 30'/2 273.~ 30'14 + '/8 39 61 59V. sa ". 59. -134 CleyOff 1.20 10 45 27 r26 27 + ~ g:iH:n1., 71/a- If' 7 571 35r3211. 3434-1Vs OevElc 1.84 8 357 18~r173,1e plille- 'i, Eckd Jk .64 2II'iA-'-34 . Fotomat .50 10 253 1031c 10'/2 1034- 'AI 1 Crocker 1.80 25'4-1'1. EdsonB 1.10 281J.- JiA FOlK Ph Sys 111182 2734 r2S 2734- '14 IS 569 3834 36=111 38 12+ 71e ClevEpf 7.56 .... lIDO 83~ ImIl g8:We-lla 3 41 -13J& 1 371·3 234 2'l'a-:liJ CIevEpf 7.40 .... z250 83 81 81-2 Crock~f Edwards .60 15~- lie Foxbro 1. 10 9 33 33 32'1l 33 + 'fa Crk pfB 2.19 mII- :ji EG&G .44 27 + 3Jo Frank M .:lO 10 751 7'/2 r6 7:j8+ 8 12 201f2 20 20 - ~ Oevpak .60 9 73 8 r7'1l • + '4 CromKnI .96 14'12- 'Ie 'I. 7 14 91f2 9'12 91h ...... OoroxCo.68 7 955 10=lIl r9~ 10=lIl+ ~ Elect Assoc 6¥a+ 'At FreptM 1.60 15 436 2J3to 22~ 23=111- '/B CrouseHin 1 m,-I=111 E1DataS .84 17 + 3.It Frigtron .22 11 440 14 11 14 .' ..... 9 • 90 26'1. 2~ 2534-!\It Cklett p 60 5 194 10 ~ 10 21'18- .'fa 4'h- 'AI FrIIauf 2.20 5 448 29'12 273,10 29=111- 3~ Fuqualn .40 5 1130 9 r71h p83.<i- 'AI PI·.::1 .• .... Fua pfBI.25 16 14'18 I~ 1~- '4 ~~: ~Ife r~~ ~;2~ ~CoecIm\f 11 -~ 12 655 33'4 31 331/.- 1/2 ........ , • a B 334 231~ r20 23',.+ JII. G 160 31h r3'1' 31h ...... CoastSG. 188 1 + 8 45 434 r4:j8 4=111- l 1 3" 147 33 h 31 h 32la-l'" CstSGpf 1.19.... 18 15',4 r14 14li- :tt 14 460 10=lIl 9:ji l(JI/.- 'I. 36 2038 191/. H- lie CstSGpf 1.83 .. _z1800 Il3Jorl13,4 18lM+ 'h .... 70 15 rl4lfa 141h- =III 7 43 634 6=!8 ~- II. CocaCoI 1.14 151166 411f2 3934 411f2+ '" 1 7 3S 26~~ 15'h 261h- '/2 8 42 52 51 h 52 + 18 CocaBotl ..0 9 898 6'h r5 14 340 421/': 41 41~+ 34 7 152 16~ lS~ J61h- I' • 4 329 7112 r63J& 7'1.- ~ 6 461 ~ ~ 6'h It 911 173.10 i614 17:j8- ~ 6 41 21 20 2OIJ. 36 2Q3.~ 20'/. H- ~ 6 252 36 35'1. 3S34 65 14'12 14 141fa- 'Ie 42 7'/. r61h 634- 3,. .. ~ : ~~ ~!:~ ~:~ ..... ~~ 9~ 279 27'1. 27 27'1.- 'I• .... 26 ~Ih 46 46lh+ '12 CoIPen 1.20 7 236 213,4 26 .... z200 34la 34 34 -I!it. 9 553 4=111 3718 4''&+ 'Ie CoItInd 2.10 4 261 33 r30'h 10 481 Wle 121/8 14118 ...... 167552 511& 41f, 5 ..... CoItpfA 1.60 1 26 26 4 442 7:j8 6:ji 7'/.- V. 9 859 23¥a r2O'h 2H+ 1~ CoItIn pf 4'4 7 67 65'h 15 597 2734 rmll 273,H:j8 16 1597 ~r1911e 2O'lII+ '12 Col Gas 2.34 6 111 26V. 251f2 Gelco Cp .70 9 2OC. 2~ ~ 26~ ...... 12 385 32 JO~ 32 + 'I, CoI(,s pf ~ 2 57 57 Gemini Cae> .... 147 2O=le 20';. 20=111- 34 8 49 20 r19 19 -1'1, Col(, pf 5...... i 55112 SSIJ:z GemIn 1.2Oa.... 5 \14!i8rI4=111 14=111-:j8 4 91 IB r17'M 17Jt.-1 Col SOh 2.32 12 190 24:\8 r1.2:tt 23'1.- ~ 1 GnAmln .92 .... 54 10 934 9¥e+ '18 11 658 16'11 15 h 167,H '/2 OSOp'f 102.5.}7j; 106 - 1/2 GnAmOI .60 19 379 32'4 29~' 31=111-1'4 5 337 22 18~ 21Jt.+l'h CoISOp .. '.2 GenBncs .80 5 19 15'12 15:tt 15=111- I. 7 69 1334 r 13',. 13'h- '/2 CoIPict.SOd 86 1 G CatlIe 1.10 8 522 143J& 1214 1434- 'Ie 9 41 2034 20 2Q3H Ih Combine.20 GCab pfJ.94 .... 102 21'h r20'h 21'h- 3Jo 5 S89 18~-:ji 19'/. r18=111 CmbEn 1.80 Gen On 1.12 8 275 34'h 32:tt 34lh- 'Ie 6 353 5la 5=111 5la ...... CmbEq.14o 1 1 Gen Dynam 1 454 6834 63 683Jo+41f2 4 261 . 5 4~~ 4Ih-:h CmwE6 2AI 18 Gn EIec 2.60 92015 48'h 46 p481f2 + ~~ 123579. 6Q3A '56),4 p603J&+41fe CwE~ 2J1 11 2i1'h 29:tt 1 GnFood 1.64 8 444 313.10 3J11a 31','2- ~2 6 482 27=11126',4 27 .... 1'h ~1.38 17 26=111 26 /0 GnGro l.SOd 15 693 22'h 22 221f.- :\8 6 S02 .•'(2,6p26!!1-:-· I,it C~1.J8 ..... 13 94 93\1e GenHost .60 .... 78 9'12 91/a 9:\8- 'I. 5 366i 2711.i·26 '; u27:tt+ '" .. CWE$f .1.42 ,;.. ; 11 1'''rl~ 7 19761f2 43Jo 6 -~; ,~~ ':;::", I~ ~:r~r 6 336 83Jo r13,4 8'1.- 3Jo =~l' .. ~ ~ ~~ ~Ih ~\'2: t .. 210 256 :AI 5 39 5~. ~ ~-:tt Gen Med .4t 12 254 1311. rl1'18 13'/.+ 1/3 ~z~~~:·£¥1· ~=111-,,2ih,.~t GnMiis 1.16 10 254 29=111 28'12 291,~+ 1/2 .... 47 11'12 ·11',4 11'4-=111 ComPSY;5O 10 219· ·r12:tt _.. 88 4'1. r4 41~- 14 7 875 29~ 26li. 29'12+ ~ GenI Mot 4a 5~1 61 60 p61 - ~ 5 551 22:tt lP. 22'4 ...... GnMotpf 33,i,.... 3 48 48 48 -:jiI _·s 1~\k.\~gl~t:;~. Be;,.. :·i~.3= r2A GenMotpf 5 .... 6 64 r63 63 -1'12 6 16213,4 20In 21. - J . ... 1.30 4 xIS GenIPort.40 5 334 11 934 11 ..... 10 119· 26~ 76 26.'1.";' ,~ . 1:60 4 149 Fair'mtF .76.':7 10 ~ ~~ ~ G PubU 1.80 7 435 17~ 17 17=111+ :jiI Gen Refrac .... 161 6 rSI" 5'1.- 3,4 ~.~. ~t :~ ~ =:!:2:Z" ='1:: 1~ ~ GenSqlaI 1 10 z33000 263J& 24~ 26112+ w. 12 630rl8la 18 1811.+ '4 ConNtG 1.60 11 2 41h- :tt 313Jo- 34 GnSteel.4Oa 6 115 7~ 6la 7~- ~ 6 15 283Jo 2I3Jo 2834-1 COlrae JOg 7 U GTE 2.41 7 1052 ~ 28 281f2- If. 6 59 19'h r18'frt 19'1e- ~ Con Ed 2.2i'I 5 734 ~ u23 -:tt Dexter 8 220 11 r16 + 3,Ie II 1 ~ DiaICDn 1.20 6 74 16'/, JS1,'2 16'/8-- ~' ~~~t t~ ~ 11~ r:~: ~~+1~ GTE pf 2'".... 1 311J:z 31 h 311f2- FedPa8 .90 7 228 193Jo 19 191f2-IV. GTE pI 2.. .... 111 261J:z r25?-9 26=111- If. ". ~ ~ ~~ ~:= ~ =~ g~ ~ ::: 1~ ~'h r:.! :.!=~ DlamhI 2.20 8 93 JOJII rlO 3Oli+ III FcFpf'l 1.20...
Recommended publications
  • The Multics System, 1975
    Honeywell The Multics System O 1975,1976,Honeywell Information Systems Inc. File No.:lLll - -- - ecure A Unique Business Problem-SolvingTool Here is a computer techniques are available to system that enables data all users automatically processing users to control through the Multics operating and distribute easily accessi- supervisor. ble computer power. The Because it is a unique Honeywell Multics System combination of advanced represents an advanced computing theory and out- approach to making the com- standing computer hardware, puter an integral, thoroughly Multics can provide an infor- reliable part of a company's mation service system more operation. advanced than any other yet The Multics System available. replaces many of the proce- Honeywell offers, as dures limiting conventional part of its advanced Series 60 systems and sweeps away line, two models for Multics - many of the factors that have the Model 68/60 and the restricted the application of Model 68/80. computers to routine data While contributing sig- processing assignments. nificantly to the application Now-with Multics - diversity of the Series 60 the computer becomes a family, these Multics systems responsive tool for solving also enable Honeywell to challenging business accommodate more efficiently problems. the computing needs of The Multics System today's businesses. incorporates many of the most user-oriented program- ming and supervisory tech- niques yet devised. These Multics is Transaction Processing -and More Although Multics is by Ease of accessibility, design a transaction oriented, featuring a simple and con- interactive information sys- sistent user interface for all tem, its functional capability types of services. There is no encompasses the full spec- job control or command trum of a general purpose language to learn and an computer.
    [Show full text]
  • Multics Security Evaluation: Vulnerability Analysis*
    * Multics Security Evaluation: Vulnerability Analysis Paul A. Karger, 2Lt, USAF Roger R. Schell, Maj, USAF Deputy for Command and Management Systems (MCI), HQ Electronic Systems Division Hanscom AFB, MA 01730 ABSTRACT operational requirements cannot be met by dedicated sys- A security evaluation of Multics for potential use as a tems because of the lack of information sharing. It has two-level (Secret / Top Secret) system in the Air Force been estimated by the Electronic Systems Division (ESD) Data Services Center (AFDSC) is presented. An overview sponsored Computer Security Technology Panel [10] that is provided of the present implementation of the Multics these additional costs may amount to $100,000,000 per Security controls. The report then details the results of a year for the Air Force alone. penetration exercise of Multics on the HIS 645 computer. In addition, preliminary results of a penetration exercise 1.2 Requirement for Multics Security of Multics on the new HIS 6180 computer are presented. Evaluation The report concludes that Multics as implemented today is not certifiably secure and cannot be used in an open This evaluation of the security of the Multics system use multi-level system. However, the Multics security was performed under Project 6917, Program Element design principles are significantly better than other con- 64708F to meet requirements of the Air Force Data Ser- temporary systems. Thus, Multics as implemented today, vices Center (AFDSC). AFDSC must provide responsive can be used in a benign Secret / Top Secret environment. interactive time-shared computer services to users within In addition, Multics forms a base from which a certifiably the Pentagon at all classification levels from unclassified to secure open use multi-level system can be developed.
    [Show full text]
  • David T. C~Ai9 736 Edgewater [M J Wichita, Kansas 67230 (USA)
    _.., ,.i.'~...< ~~ ':' ..". PASCAL US~RS GROUP Pa.scal.N ews I.. NUMlsER ,< Iq COMMUNICATIONS ABOUT THE PROGRAMMING LANGUAGE PASCAL BVPASCALERS SE PT EMbER .,1980 ~,_v., j : ;,. ~ - EX LIBRIS: David T. C~ai9 736 Edgewater [M J Wichita, Kansas 67230 (USA) ' ... '-" .- . .. .,.- ... ., '-" -'. ..,. ...- .--'- -"--"'.". '. POLICY: PASCAL NEWS (15...Sep...80) * Pascal~ is the official but informal publication of the User's Group. * Pascal Newa contains all we (the editors) kriowabout Pascal; we use it as the vetlICIe to answer all inquiries because our physical energy and resources for answering individual requests are finite. As PUG grows, we unfortunately succumb to the reality of: 1. Having to insist that people ~o need to know "about Pascal" join PUG and read Pascal News - that is why we spend lime to produce, it! 2. Refusing to return phone calls or answer letters full of questions - we will pass the questions on to the readership of Pascal News. Please understand what the collective effect of individual inquirie8lias at the "concentrators" (our phones and mailboxes). We are trying honestly to say: "We cannot promise more that we can do." ' * Pascal News is produced 3 or4 times during a year; usually in March, June, September, and December. * ALL THE NEWS THAT'S FIT, WE PRINT .Please send material (brevity is a virtue) for Pascal News single-spaced and camera-ready (use dark ribbon and 18.5 em lines!) '. - ~ * Remember : ALL LETTERS TO US WILL BE PRINTED UNLESS THEY CONTAIN A REQUEST u TO THE CONTRARY. -.- * Pascal News is divided into flexible sections: o POLICY - explains the way we do things (ALL-PURPOSE COUPON, etc.) EDITOR'S CONTRIBUTION - passes along the opinion and point of view of the D.
    [Show full text]
  • Towards Comprehensible and Effective Permission Systems
    Towards Comprehensible and Effective Permission Systems Adrienne Porter Felt Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2012-185 http://www.eecs.berkeley.edu/Pubs/TechRpts/2012/EECS-2012-185.html August 9, 2012 Copyright © 2012, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Towards Comprehensible and Effective Permission Systems by Adrienne Porter Felt A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor David Wagner, Chair Professor Vern Paxson Professor Tapan Parikh Fall 2012 Towards Comprehensible and Effective Permission Systems Copyright c 2012 by Adrienne Porter Felt Abstract Towards Comprehensible and Effective Permission Systems by Adrienne Porter Felt Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Wagner, Chair How can we, as platform designers, protect computer users from the threats associated with ma- licious, privacy-invasive, and vulnerable applications? Modern platforms have turned away from the traditional user-based permission model and begun adopting application permission systems in an attempt to shield users from these threats. This dissertation evaluates modern permission systems with the goal of improving the security of future platforms.
    [Show full text]
  • US Department of the Interior Geological Survey Mail Stop 964 Box 25046, Federal Center'denver, Colorado 80225
    U.S. Department of the Interior Geological Survey Mail Stop 964 Box 25046, Federal Center 'Denver, Colorado 80225 Program MARQDCLAG: Marquardt inversion of DC-Schlumberger soundings by lagged-convolution by Walter L. Anderson Open-File Report 79-1432 1979 Multics Documentation Page 2 Program MARQDCLAG CONTENTS DISCLAIMER 3 INTRODUCTION * 4 PARAMETERS AND DATA REQUIRED 5 PROGRAM FILES 5 DETAIL PARAMETER AND DATA DEFINITIONS 6 $parras parameters 6 $init parameters 10 DATA MATRIX NOTES 11 EXAMPLES OF INPUT PARAMETERS AND DATA ORDERING 11 SPECIAL OBJECT FORMAT PHRASES 12 MULTICS OPERATING INSTRUCTIONS 12 ERROR MESSAGES 13 PRINTED RESULTS ]4 REFERENCES 16 Appendix 1.-- Source listing 17 Source availability 17 Appendix 2.-- Conversion to other systems 53 Appendix 3.-- Test problem input/output listing 54 Multics Documentation Page 3 Program MARQDCLAG DISCLAIMER This program was written in Fortran IV for a Honeywell Multics 68/80 system*. Although program tests have been made, no guarantee (expressed or implied) is made by the author regarding accuracy or proper functioning of this program on all computer systems. * Brand or manufacturers' names used in this report are for descriptive purposes only and do not constitute endorsement by the U.S. Geological Survey. Multics Documentation Page 4 Program MARQDCLAG By Walter L. Anderson INTRODUCTION Program MARQDCLAG is a general-purpose program for the least squares inversion of direct-current (DC) Schlumberger sounding data obtained over one-dimensional horizontally stratified earth models. A modified Marquardt (1963) nonlinear least squares algorithm (MARQRT) is used for inversion of Schlumberger soundings. A digital filter developed by Anderson (1975) is employed, along with a fast lagged-convolution adaptive algorithm (RLAGH1), to efficiently and accurately evaluate the necessary Hankel transform integrals for a Schlumberger array configuration (see for example, Zohdy, 1975, p.
    [Show full text]
  • The Evolution of the Unix Time-Sharing System*
    The Evolution of the Unix Time-sharing System* Dennis M. Ritchie Bell Laboratories, Murray Hill, NJ, 07974 ABSTRACT This paper presents a brief history of the early development of the Unix operating system. It concentrates on the evolution of the file system, the process-control mechanism, and the idea of pipelined commands. Some attention is paid to social conditions during the development of the system. NOTE: *This paper was first presented at the Language Design and Programming Methodology conference at Sydney, Australia, September 1979. The conference proceedings were published as Lecture Notes in Computer Science #79: Language Design and Programming Methodology, Springer-Verlag, 1980. This rendition is based on a reprinted version appearing in AT&T Bell Laboratories Technical Journal 63 No. 6 Part 2, October 1984, pp. 1577-93. Introduction During the past few years, the Unix operating system has come into wide use, so wide that its very name has become a trademark of Bell Laboratories. Its important characteristics have become known to many people. It has suffered much rewriting and tinkering since the first publication describing it in 1974 [1], but few fundamental changes. However, Unix was born in 1969 not 1974, and the account of its development makes a little-known and perhaps instructive story. This paper presents a technical and social history of the evolution of the system. Origins For computer science at Bell Laboratories, the period 1968-1969 was somewhat unsettled. The main reason for this was the slow, though clearly inevitable, withdrawal of the Labs from the Multics project. To the Labs computing community as a whole, the problem was the increasing obviousness of the failure of Multics to deliver promptly any sort of usable system, let alone the panacea envisioned earlier.
    [Show full text]
  • & Electrical Engineering
    COMPUTER ARCUTECTURFL Gordon Bell Vice President, Engineering Digital Equipment Corporation & Professor of Computer Science & Electrical Engineering Carnegie-Mellon University (on leave) Abstract Minimal cost computer designs ( i.e. minicomputers) are predicated on using technological cost-performance improvements which occur at an annual rate of 25-305. New applications are thereby feasible with the decreasing costs. A significant number of minicomputers are manufactured in which the cost is constant (or rising), thereby providing more performance (capabilities). The higher performance machines "taket1 their characteristics from the larger, general purpose camputers (e.g. floating point arith- metic, multiprocessors, cache memories and memory management) . The origin and evolution of the minicomputer will be discussed with regard to technology and applications. 7 17178 THR PDP-I? FAMILY AND VAX-Ill780 FOR A LARGE VIRTUAL ADDRESS Gordon Bell Vice President, Engineering Digital Equipment Corporation & Professor of Computer Science & Electrical Engineering Carnegie-Mellon University (on leave) Abstract In the eight years the PDP-11 has been on the market, more than 50,000 units in ten different models have been sold. Although one of the system design goals was a broad range of models, the actual range of 500 to 1 (in price and memory size) has exceeded the design goal. The PDP-11 was designed and first implemented to be a mall minicomputer. Its first extension was to a bigger physical address, memory segmentation for multiprogramming and for higher performance. This part of the talk will briefly reflect the experience in the design process, comment on its success from the point of view of the goals, and its use of technology.
    [Show full text]
  • Lessons from the Multics Security Evaluation
    Thirty Years Later: Lessons from the Multics Security Evaluation Paul A. Karger Roger R. Schell IBM Corp., T. J. Watson Research Center Aesec Corporation Yorktown Heights, NY 10598 Pacific Grove, CA 93950 [email protected] [email protected] ABSTRACT 2 Multics Security Compared to Now Almost thirty years ago a vulnerability assessment of Multics offered considerably stronger security than Multics identified significant vulnerabilities, despite the most systems commercially available today. What factors fact that Multics was more secure than other contempo- contributed to this? rary (and current) computer systems. Considerably more important than any of the individual design and imple- mentation flaws was the demonstration of subversion of 2.1 Security as a Primary Original Goal the protection mechanism using malicious software (e.g., Multics had a primary goal of security from the very trap doors and Trojan horses). A series of enhancements beginning of its design [16, 18]. Multics was originally were suggested that enabled Multics to serve in a rela- conceived in 1965 as a computer utility – a large server tively benign environment. These included addition of system on which many different users might process data. “Mandatory Access Controls” and these enhancements This requirement was based on experience from develop- were greatly enabled by the fact the Multics was designed ing and running the CTSS time sharing system at MIT. from the start for security. However, the bottom-line con- The users might well have conflicting interests and there- clusion was that “restructuring is essential” around a fore a need to be protected from each other – a need quite verifiable “security kernel” before using Multics (or any like that faced today by a typical Application Service Pro- other system) in an open environment (as in today’s vider (ASP) or Storage Service Provider (SSP).
    [Show full text]
  • It Has to Be Good: a History of the Petroleum
    It Has to be Good A History of the Petroleum Abstracts Service at The University of Tulsa John A. Bailey Any opinions or interpretation of facts contained in this document are solely those of the author and do not necessarily reflect policies of The University of Tulsa Copyright 2004 John A. Bailey All Rights Reserved Preface This is the story of an uncommon partnership between industry and an academic institution. An industry segment had a need and a prominent university had the vision, talent and determination to fulfill that need. It is also the story of a great deal of hard work, innovation, occasional crisis and cooperation. It is the story of how an organization reflects the characteristics, experience and mindset of the men (and, so far, they have all been men) that led it. This, then, is the story of the Petroleum Abstracts Service at The University of Tulsa that began over 40 years ago. We have attempted to make the story as interesting as possible, a challenge for someone trained as an engineer and computer professional. While some of the information presented here comes from surviving documents, particularly for the early years, much of it is based on memory and occasional hearsay. The reader will also encounter the occasional inside joke. For these offenses, and for any other deficiencies, the author accepts, however begrudgingly, full responsibility. A Need and an Opportunity The late 1950s was not a good time for the petroleum exploration and production industry. Following the resolution of the Suez crisis in 1956, a surplus of crude supply developed and the resulting decline in oil prices began to erode the economics of the industry.
    [Show full text]
  • General Disclaimer One Or More of the Following Statements May Affect
    General Disclaimer One or more of the Following Statements may affect this Document This document has been reproduced from the best copy furnished by the organizational source. It is being released in the interest of making available as much information as possible. This document may contain data, which exceeds the sheet parameters. It was furnished in this condition by the organizational source and is the best copy available. This document may contain tone-on-tone or color graphs, charts and/or pictures, which have been reproduced in black and white. This document is paginated as submitted by the original source. Portions of this document are not fully legible due to the historical nature of some of the material. However, it is the best reproduction available from the original submission. Produced by the NASA Center for Aerospace Information (CASI) N APF16-M SFC'02121 N I j O L1 1. C/J :9E C; r`• ii. Technical Report 'M DA -TA BASE MANAGEMENT' S -T- L.JI D ' INTERIM REPORT (NASA-CR-1`-0167) DATA BASE MANAGEMENT STUDY N77-15671 Interim Report (Teledyne Brown Engineering) 62 p HC A04/MF A01 CSCL 09B Uaclas G3/60 12515 May 19/6 a FED 1' RWEIVEC' NASA M %CIU INPUT R*NGH TELEDYNE BROWN ENGINEERING C^umrnings Research Park- Huntsville, Alabama 35807 I TECHNICAL REPORT APF76-MSFC-02127 DATA BASE IMAGEMENT STUDY INTERIM REPORT May, 1976 Prepared for Data Systems Laboratory George C. Marshall Space Flight Center Huntsville, Alabama Contract No. NAS8-31488 Prepared by Advanced Projects Division . Teledyne Brown Engineering . Huntsville, Alabama ABSTRACT This interim report presents the results of work performed by Teledyne Brown Engineering (TBE) under NASA contract NAS8-31488.
    [Show full text]
  • Cryptography and Data Security
    Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 1982-05 Cryptography and Data Security Denning, Dorothy E. þÿDenning, D. E., Cryptography and Data Security, Addison Wesley, May 1982. http://hdl.handle.net/10945/37163 Cryptography and 13ata Security Dorothy Elizabeth Rob,ling Denning PURDUE UNIVERSITY A VV ADDISON-WESLEY PUBLISHING COMPANY Reading, Massachusetts [] Menlo Park, California London II Amsterdam • Don Mills, Ontario I Sydney Library of Congress Cataloging in Publication Data Denning, Dorothy E., (Dorothy Elizabeth), 1945- Cryptography and data security. Includes bibliographical references and index. 1. Computers--Access control. 2. Cryptography. 3. Data protection. 1. Title. QA76.9.A25D46 1982 001.64'028'9 81-15012 ISBN 0-201-10150-5 AACR2 Copyright © 1982 by Addison-Wesley Publishing Company, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or other- wise, without the prior written permission of the publisher. Printed in the United States of America. Published simultaneously in Canada. ISBN 0-201-10150-5 A BCDE FG H I J-M A-898765432 In memory of my Father, Cornelius Lowell Robling 1910-1965 Preface Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data. Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modifica- tion.
    [Show full text]
  • Al39-01C Contents
    HONEYWELL DPS/LEVEL 68 & DPS 8M MULTICS PROCESSOR MANUAL HARDWARE PREFACE This manual describes the processors used in the Multics system. These are the DPS/L68, which refers to the DPS, L68 or older model processors (excluding the GE-645) and DPS 8M, which refers to the DPS 8 family of Multics processors, i.e. DPS 8/70M, DPS 8/62M and DPS 8/52M. The reader should be familiar with the overall modular organization of the Multics system and with the philosophy of asynchronous operation. In addition, this manual presents a discussion of virtual memory addressing concepts including segmentation and paging. The manual is intended for use by systems programmers responsible for writing software to interface with the virtual memory hardware and with the fault and interrupt portions of the hardware. It should also prove valuable to programmers who must use machine instructions (particularly language translator implementors) and to those persons responsible for analyzing crash conditions in system dumps. This manual includes the processor capabilities, modes of operation, functions, and detailed descriptions of machine instructions. Data representation, program-addressable registers, addressing by means of segmentation and paging, faults and interrupts, hardware ring implementation, and cache operation are also covered. The information and specifications in this document are subject to change without notice. Consult your Honeywell Marketing Representative for product or service availability. 11/85 ©Honeywell Information Systems Inc., 1985 File No.:
    [Show full text]