Corpus ID: 15865277

On Five Deenitions of Data Integrity 1

@inproceedings{Sandhu1993OnFD,
  title={On Five Deenitions of Data Integrity 1},
  author={R. Sandhu},
  year={1993}
}
This paper compares ve de nitions of data integrity, and shows how they can be ordered in an increasingly restrictive sequence. The most general of these, due to Courtney and Ware [6], is based on the concept of expectation of data quality: data has integrity to the extent that its quality meets, or exceeds, the quality requirements that users expect of it. This de nition incorporates liveness requirements, whereas the others only address safety requirements. The second and third de nitions are… Expand

Figures from this paper

Research on Quantitative Evaluation for Integrity
  • Lihua Yin, Yunchuan Guo
  • Computer Science
  • 2009 Fifth International Conference on Information Assurance and Security
  • 2009
TLDR
For the purpose, formal definitions of integrity based on probabilistic computation tree logic (PCTL) and quantitative evaluation model of integrity are presented and results show that the formal description of integrity is of great significance and evaluation results are different with different integrity goals even for the same system. Expand

References

SHOWING 1-10 OF 25 REFERENCES
A comparison of type enforcement and Unix setuid implementation of well-formed transactions
  • D. Thomsen, J. Haigh
  • Computer Science
  • [1990] Proceedings of the Sixth Annual Computer Security Applications Conference
  • 1990
TLDR
The effectiveness of two mechanisms for implementing the concept of a well-formed transaction, the Secure Ada Target (SAT) type enforcement mechanism and the Unix setuid mechanism are compared and contrasted. Expand
Using mandatory integrity to enforce 'commercial' security
  • Theodore M. P. Lee
  • Computer Science
  • Proceedings. 1988 IEEE Symposium on Security and Privacy
  • 1988
TLDR
It is shown two natural extensions-integrity categories and partially trusted subjects-of the principles of current US Department of Defense computer security standards could be used to implement such commercial security policies in a way that exploits the fundamental strengths of existing or future trusted systems. Expand
Integrity controls for military and commercial applications
  • R. R. Jueneman
  • Computer Science
  • [Proceedings 1988] Fourth Aerospace Computer Security Applications
  • 1988
TLDR
It is concluded that a mandatory integrity policy consisting of the Biba hierarchical integrity policy extended to include integrity categories and multilevel integrity-trusted subjects, plus a discretionary integrity policy that uses a digital signature mechanism incorporated in a file label to indicate who created or produced that file, can provide integrity controls very well-suited to the networking environment. Expand
A Comparison of Commercial and Military Computer Security Policies
TLDR
It is argued that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to Control disclosure and to provide integrity. Expand
DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA
FOREWORD This publication, DoD 5200.28−STD, "Department of Defense Trusted Computer System Evaluation Criteria," is issued under the authority of an in accordance with DoD Directive 5200.28,Expand
A lattice model of secure information flow
TLDR
The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches to formulating the requirements of secure information flow among security classes. Expand
The Canadian trusted computer product evaluation criteria
TLDR
The Canadian trusted computer product evaluation criteria, is an attempt to address those areas which were not (or were insufficiently) addressed in the US TCSEC. Expand
Lattice-based access control models
TLDR
A balanced perspective on lattice-based access control models is provided and information flow policies, the military lattice,Access control models, the Bell-LaPadula model, the Biba model and duality, and the Chinese Wall lattice are reviewed. Expand
Integrity considerations for secure computer systems
Some Informal Comments About Integrity and the Integrity Work shop.
  • Proc. of the Invitational Workshop on Data Integrity,
  • 1989
...
1
2
3
...