Information Integrity Policies

  title={Information Integrity Policies},
  author={Peng Li Yun Mao Steve Zdancewic},
  • Peng Li Yun Mao Steve Zdancewic
  • Published 2003
Information integrity policies are traditionally enforced by access control mechanisms that prevent unauthorized users from modifying data. However, access control does not provide end-to-end assurance of integrity. For that reason, integrity guarantees in the form of noninterference assertions have been proposed. Despite the appeals of such information-flow based approaches to integrity, that solution is also unsatisfactory because it leads to a weaker notion of integrity than needed 
Highly Cited
This paper has 49 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 41 references

Jif: Java information flow

  • Andrew C. Myers, Nathaniel Nystrom, Lantian Zheng, Steve Zdancewic
  • Software release. Located at http://www.cs…
  • 2001
Highly Influential
3 Excerpts

Building secure distributed systems using replication and partitioning

  • Lantian Zheng, Stephen Chong, Steve Zdancewic, Andrew C. Myers
  • In IEEE 2003 Symposium on Security and Privacy…
  • 2003
1 Excerpt

Similar Papers

Loading similar papers…