Consequently, it was felt prudent to classify the report Confidential overall. Saltzer, Massachusetts Institute of Technology, Cambridge, Mass. Moskowitz (ex officio), National Security Agency, Fort George G. Ware (ex officio), The Rand Corporation, Santa Monica, Calif.
Following are the members of the Steering Group: Willis H. Egan, Office of the Secretary of Defense/DDR&E, Department of Defense, Washington, D. Kuipers, Central Intelligence Agency, Washington, D. The term includes systems commonly called time-sharing, multiprogrammed, remote batch, on-line, multi-access, and, where two or more processors share all of the primary memory, multiprocessing.
Ware, Chairman, The Rand Corporation, Santa Monica, Calif. Patrick Haverty, Deputy Chairman, The Rand Corporation, Santa Monica, Calif. Mosier, Vice Chairman, System Development Corporation, Santa Monica, Calif. Bushkin, Secretary, Lockheed Missiles and Space Co., Palo Alto, Calif (formerly, Massachusetts Institute of Technology and Bolt, Beranek and Newman) Elliot Cassidy, Directorate for Security Policy, Department of Defense, Washington, D. The principle distinction among the systems is whether a user must be present (at a terminal, for example) to interact with his job (time-sharing, on-line, multi-access), or whether the jobs execute autonomously (multiprogrammed, remote batch).
For example, it includes an appendix that outlines and formally specifies a set of access controls that can accommodate the intricate structure of the classification system used by the defense establishment. The Introduction and portions of Part A were initially authored by Wade B. Ware, incorporating material from a paper by the Technical Panel and some information from personal letters of Prof. The Technical Recommendations, Part C, mainly reflect the content of two papers produced by the Technical Panel, modified to a minor extent by information from personal letters of Prof. Finally, Part D, on Management and Administrative Control, was written by Willis H. The subject of security control in multi-access computer systems is of sufficiently wide interest that many members of the Steering Group and the Panels contacted a number of individuals, organizations, and agencies in the course of this effort.
The original classification of the report limited its distribution largely to defense agencies and defense contractors; civil agencies of government and industry at large generally did not have access to it. Ware, and utilizes ideas from "Security of Classified Information in the Defense Intelligence Agency's Analyst Support and Research System" (February 1969, C-3663/MS-5), and from "Security Procedures for the RYE System" (W. It would be impossible to mention every person with whom we have talked and who in some way has influenced our final recommendations.
A slightly modified version of the report -- the only omissions were two memoranda of transmittal from the Task Force to the Chairman of the Defense Science Board and onward to the Secretary of Defense -- was subsequently published as Rand Report R-609, Security Controls for Computer Systems.
At that time it was felt that because representatives from government agencies participated in the work of the Task Force, the information in the report would appear to be of an official nature, suggestive of the policies and guidelines that would eventually be established.The organizational meeting was held the following month, and thereafter the Panels and the Steering Group met on a regular basis to formulate the recommendations that constitute the body of this Report. Moreover, the use of such systems has focused attention on the broader issue of using computers, regardless of the configuration, to store and process classified information.The Task Force has operated formally under the authority of the Defense Science Board. Glaser, Case Western Reserve University, Cleveland, Ohio John W. Resource-sharing systems are those that distribute the resources of a computer system (e.g., memory space, arithmetic units, peripheral equipment, channels) among a number of simultaneous users.Each user's program is executed in some order and for some period of time, not necessarily to completion.The central processing equipment devotes its resources to servicing users in turn, resuming with each where it left off in the previous processing cycle.APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED In October 1967 a Task Force was organized by the Advanced Research Projects Agency (now the Defense Advanced Research Projects Agency) to study and recommend appropriate computer security safeguards that would protect classified information in multi-access, resource-sharing computer systems.