The Community for Technology Leaders
RSS Icon
Oakland, CA
Apr. 27, 1987 to Apr. 29, 1987
ISBN: 0-8186-0771-8
pp: 184
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to provide control of classified information. However, for that core of data processing concerned with business operation and control of assets, the primary security concern is data integrity. This paper presents a policy for data integrity based on commercial data processing practices, and compares the mechanisms needed for this policy with the mechanisms needed to enforce the lattice model for information security. We argue that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to Control disclosure and to provide integrity.
Military computing, Computers, Information security, Data processing, Computer security, Computational modeling,
David D. Clark, David R. Wilson, "A Comparison of Commercial and Military Computer Security Policies", SP, 1987, 2012 IEEE Symposium on Security and Privacy, 2012 IEEE Symposium on Security and Privacy 1987, pp. 184, doi:10.1109/SP.1987.10001
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool