ABSTRACT
Sometime during the 1980s we crossed a line from a world in which the majority of computer users were
users of multi-user systems to one in which the majority were users of single-user systems. We are now in
the process of connecting all computers in the world into the most complex mechanism that humans
have ever built. Although for many purposes we may be able to do this on an ad hoc basis, for purposes of
security, audit, and control it is essential that we have a rigorous and timely design. We will not achieve
effective, much less efficient, security without an enterprisewide design and a coherent
management system.