In: Film and Music

Submitted By demonscout7
Words 8970
Pages 36
Introduction and Abstract
Copyright(c), 1984, Fred Cohen - All Rights Reserved
This paper defines a major computer security problem called a virus. The virus is interesting because of its ability to attach itself to other programs and cause them to become viruses as well. There are two spellings for the plural of virus; 'virusses', and 'viruses'. We use the one found in Webster's 3rd International Unabridged Dictionary Given the wide spread use of sharing in current computer systems, the threat of a virus carrying a Trojan horse [Anderson72] [Linde75] is significant. Although a considerable amount of work has been done in implementing policies to protect from the illicit dissemination of information [Bell73] [Denning82], and many systems have been implemented to provide protection from this sort of attack [McCauley79] [Popek79] [Gold79] [Landwehr83], little work has been done in the area of keeping information entering an area from causing damage [Lampson73] [Biba77]. There are many types of information paths possible in systems, some legitimate and authorized, and others that may be covert [Lampson73], the most commonly ignored one being through the user. We will ignore covert information paths throughout this paper.
The general facilities exist for providing provably correct protection schemes [Feiertag79], but they depend on a security policy that is effective against the types of attacks being carried out. Even some quite simple protection systems cannot be proven 'safe' [Harrison76]. Protection from denial of services requires the detection of halting programs which is well known to be undecidable [Garey79]. The problem of precisely marking information flow within a system [Fenton73] has been shown to be NP-complete. The use of guards for the passing of untrustworthy information [Woodward79] between users has been examined, but in general depends on the…...

Similar Documents


...saAlthough fine artists have used crowdsourcing during the “Relational Art” movement in the 90s to produce works of art long before the word dsadsaState of Play,” “The Last King of Scotland”) solicited videos shot around the globe on July 24, 2010. From more than 80,000 submissions, they fashioned a 90-minute film representing a day in the life of the world — that part of the world with a video camera and an Internet connection, anyway. It’s a hard movie to engage with or even sit through, despite the fact that much of the material is interesting in its own right. Oddly, but perhaps predictably, the problem is the resolutely conventional and soft-headed way in which that material has been assembled. Given the chance to do whatever they wanted, the filmmakers ended up with something resembling a sentimental credit-card commercial stretched to feature length: a chronological pseudonarrative that intersperses obvious montages — people getting out of bed, people making coffee — with more specific biographical passages and sets it all to a sugary, manipulative soundtrack. (There are some violent or emotionally difficult moments, but the overall tone remains gee-whiz.) The most compelling scenes — a girl with a helmet-cam climbing to the top of a human tower at a circus; a man and his son saying morning prayers before a photograph of an absent woman — are like trailers for films we won’t get to see. Otherwise, “Life in a Day” is “Koyaanisqatsi” minus the consistent visual......

Words: 397 - Pages: 2