• Corpus ID: 15865277

On Five Deenitions of Data Integrity 1

@inproceedings{Sandhu1993OnFD,
  title={On Five Deenitions of Data Integrity 1},
  author={Ravi S. Sandhu},
  year={1993}
}
This paper compares ve de nitions of data integrity, and shows how they can be ordered in an increasingly restrictive sequence. The most general of these, due to Courtney and Ware [6], is based on the concept of expectation of data quality: data has integrity to the extent that its quality meets, or exceeds, the quality requirements that users expect of it. This de nition incorporates liveness requirements, whereas the others only address safety requirements. The second and third de nitions are… 

Figures from this paper

References

SHOWING 1-10 OF 25 REFERENCES
TERMINOLOGY, CRITERIA AND SYSTEM ARCHITECTURES FOR DATA INTEGRITY
In response to the strawman document [9] we propose that trust be treated as synonymous with integrity rather than synonymous with con dence. We also propose that mandatory controls be taken to mean
A comparison of type enforcement and Unix setuid implementation of well-formed transactions
  • D. ThomsenJ. Haigh
  • Computer Science
    [1990] Proceedings of the Sixth Annual Computer Security Applications Conference
  • 1990
TLDR
The effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism are compared and contrasted.
Integrity controls for military and commercial applications
  • R. R. Jueneman
  • Computer Science
    [Proceedings 1988] Fourth Aerospace Computer Security Applications
  • 1988
TLDR
It is concluded that a mandatory integrity policy consisting of the Biba hierarchical integrity policy extended to include integrity categories and multilevel integrity-trusted subjects, plus a discretionary integrity policy that uses a digital signature mechanism incorporated in a file label to indicate who created or produced that file, can provide integrity controls very well-suited to the networking environment.
A Comparison of Commercial and Military Computer Security Policies
TLDR
It is argued that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to Control disclosure and to provide integrity.
DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA
TLDR
This publication is effective immediately and is mandatory for use by all DoD Components in carrying out ADP system technical security evaluation activities applicable to the processing and storage of classified and other sensitive DoD information and applications as set forth herein.
The Canadian trusted computer product evaluation criteria
  • E. Bacic
  • Political Science, Computer Science
    ACSAC
  • 1990
TLDR
The Canadian trusted computer product evaluation criteria, is an attempt to address those areas which were not (or were insufficiently) addressed in the US TCSEC.
Integrity considerations for secure computer systems
Some Informal Comments About Integrity and the Integrity Workshop.
  • Proc. of the Invitational Workshop on Data Integrity,
  • 1989
Some Informal Comments About Integrity and the Integrity Work shop.
  • Proc. of the Invitational Workshop on Data Integrity,
  • 1989
...
...