Abstract
This paper presents a set of rules of operation which guarantee that a computer system can remain secure while exhibiting certain desired external characteristics. The rules are easily transformable into algorithms suitable for implementation on a digital computer.
Get full access to this article
View all access options for this article.
