John Hopkins on Mon, 7 Nov 2011 03:49:31 +0100 (CET) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> Glossary |
ALPHANUMERICCharacter set including both letters and numerals and usually other characters. (American Standard Code for Information Interchange)
CONTROL CODE A fixed length machine encoding of a control code name. CONTROL CODE NAMEThe English alphanumeric expression of security classification and any need-to-know restrictions for an entity of data or program,
CONTROL MODE Mode in which a processor can execute the full set of operation codes, DATA BASEThe store of information records being maintained' for users; includes programs as well.
DESCRIPTOR Instruction for input/output control processor execution, ELECTRONIC DATA PROCESSING (EDP) Data processing by equipment predominantly electronic. ENTITY A string of bits, characters, or words having an associated control code. EXECUTIVE CONTROL PROGRAM (ECP)Program mat controls the secure execution of user programs by assigning hardware and performing security related operations.
FAIL SAFEProgram or processing operation terminates automatically whenever proper responses to positive checks are not received.
FILE A related information grouping, e, g, logical records, card images, etc. FLAG BITA bit contained in memory words and used for control purposes rather than actual user processing.
FORMATTED FILE SYSTEMAn information storage and retrieval system using a file design having fixed, periodic, and variable parts.
INPUT/OUTPUT CONTROL PROCESSOR (IOCP)A limited purpose processor serving as intermediary between main memory and terminal units.
LOGICAL RECORDA group of related items stored in one or more related physical records, depending upon length.
MODE Processor condition as determined by state of a redundant set of flip-flops. MULTIPROCESSING Executing one or more programs simultaneously on more than one processor. MULTIPROGRAMMING Executing more than one program, time interleaved. OBJECTA contiguous string of instructions, data, or working storage required by a program.
ON-LINEA terminal unit having direct connection with a unit buffer in the input/output control processor.
PERIPHERAL UNITAny type of input/output equipment connected with a unit buffer in the input/output control processor.
PHYSICAL RECORD The smallest directly addressable portion of the data base. PRIVILEGED INSTRUCTION One executable by a processor only in control mode. PROGRAM REFERENCE TABLEContains the name and/or descriptor for each object referenced by a program, and the base address and memory bounds for objects in high-speed memory.
SECURITY LEVELThe maximum security classification authorized for information handled by an equipment, as determined by the equipment characteristics or its location.
TERMINAL UNIT An input or output device in a work station. THIN-THREAD ANALYSISDescription of complex system operation or theory by following a single line, step-by-step, from start to finish, ignoring the
secondary branches or ideas involved. USERAny authorized equipment operator, maintenance person, or intelligence research analyst. The system supervisor (or supervisors) is an authorizer as well as user.
USER'S CONTROL PROFILECompletely describes each user's access authorization for information in the system in terms of control code lists by access type (read only or read and write). It also includes the user's key pattern information for identification plus authentication information for validating that the user really is who the user's key pattern indicate.
he is. USER'S KEYA physical card or key unique to a user which must be present in the user's key pattern generator at a work station to permit information
flow with any terminal unit in that work station. USER'S KEY PATTERNAn electrical logical bit pattern resulting from the user's key pattern generator at a work station which initiates user identification and is required for information interchange with any terminal unit in that work station for that user.
USER'S KEY PATTERN GENERATOR A transducer from user's key to user's key pattern. USER MODEMode in which a processor can execute only a partial set of operation codes; excluded are the privileged instructions.
WORK STATIONA separate, physically secure, area with its own user's key pattern generator in which the terminal units can be operated by only one user at a time.
-- SECURITY TECHNIQUES FOR EDP OF MULTILEVEL CLASSIFIED INFORMATION (RADC-TR-65-415) -- ++++++++++++++++++++++++++++++++++++++++++++++++++ John Hopkins exploring the patterns and flows of cosmological power @ http://neoscenes.net/ http://tech-no-mad.net/blog/ ++++++++++++++++++++++++++++++++++++++++++++++++++ # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime@kein.org