skip to main content
10.1145/800173.809687acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-national-conferenceConference Proceedingsconference-collections
Article
Free Access

Secure use of personal workstations and local area networks

Published:01 January 1983Publication History

ABSTRACT

This panel is charged with presenting solutions to problems associated with securing the personal workstation and local area networks. My function is to set the stage for the presentations which will follow by defining technology changes that are occurring and suggesting security issues that evolve from these changes. My job, then, is to raise the problems while my esteemed associates will present the solutions.

Changes are occurring both in the technology that we are using and in the manner in which businesses are managed. At least nine major technology changes impact office systems. First, there is a move which seems to grow daily towards distributed data processing. A partial cause of this movement is the increased availability of small computers and management's desire to have their processing power closer to the information users.

Index Terms

  1. Secure use of personal workstations and local area networks

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              ACM '83: Proceedings of the 1983 annual conference on Computers : Extending the human resource
              January 1983
              278 pages
              ISBN:0897911202
              DOI:10.1145/800173

              Copyright © 1983 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 January 1983

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article
            • Article Metrics

              • Downloads (Last 12 months)4
              • Downloads (Last 6 weeks)0

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader