Data Security: Introduction and Motivation

  • Ernst L. Leiss
Part of the Foundations of Computer Science book series (FCSC)


In the last few years, the amount of information stored in electronic media has increased significantly. Information which is stored in some medium is usually called data. An important aspect of the storage of information is the way in which access is performed; this is commonly called information retrieval. Here, practically always some knowledge is required in order to be able to access the information. This knowledge can come in many different forms. For example, in order to be able to withdraw money from an automated teller, a certain code must be sup­plied. This code is assigned to the account holder personally and is to be kept confidential. It should be noted that this is indeed an example of limiting access to information, as it is the stored information (“How much money is left in the account?”) which is ultimately translated into more tangible resources (i.e., bank notes). Of crucial importance is the requirement that without this knowledge the stored information cannot be accessed. Clearly, it would be highly undesirable if someone other than the account holder, i.e., someone who does not know the code, could withdraw money from the account. Since this vital knowledge is deliberately hidden, presumably by the owner of the resource, access becomes impossible for anybody but the original owner. Thus the re­source is protected, the information is secret.


Data Security Confidential Data Access Mechanism Restricted Group Bank Note 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Plenum Press, New York 1982

Authors and Affiliations

  • Ernst L. Leiss
    • 1
  1. 1.University of HoustonHoustonUSA

Personalised recommendations