Skip to Main Content
Selective sharing of information has been considered in this paper only with regard to auxiliary storage in a certain general type of time-sharing system. Further study is needed to provide an efficient authorization system within the central processor's main storage. Effort is also required to enable programs to pass privileges selectively when calling other programs.
Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.