Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
INTEGRITY CONSIDERATIONS FOR SECURE COMPUTER SYSTEMS
Post: #1

INTEGRITY CONSIDERATIONS FOR SECURE COMPUTER SYSTEMS


.pdf  INTEGRITY C~ONSIDERATIONS.pdf (Size: 3.03 MB / Downloads: 55)


INTRODUCTION
OVERVIEW


Ensuring legitimate access to privileged information has become
a major area of concern for information processing technology. The
rapidly growing use of complex resource sharing information systems1
has emphasized the need to carefully identify and guarantee who has
which access to what data. Experience has indicated that the protection
issue is two-pronged: concerned both with the proper dissemination
of information and with that information's validity. Our
concern, in this paper, is an examination of how information validity
may be maintained.
Our context is the Secure General Purpose Computer Project of
the Air Force's Electronic Systems Division [1]. Its purpose is the
6 design, construction, and formal validation of a secure computer
utility for the military environment. The term secure computer
utility refers to an interactive, multi -)grammed, multiprocessor
computer system supporting resource sharing in a manner determined
by an information protection policy. Its effective enforcement of
the protection policy must be formally validated before it can be
certified, by the appropriate authority, for use with classified
information.


Access Modes
The above example presented a rather abstract form of access,
independent of the semantics associated with an access. In general,
access domains are partitioned on the basis of the mode (semantics)
of the access. In this paper we will be concerned with three abstract
modes of acces~i observation, modification, and invocation.
Access permission, for each of these modes, will be explicitly
identified.
Observation, as the name implies, relates to the viewing of information
by a subject. Central to observation is the testing of
information. We state that observation is the testing of information
that res3ults in a choice of distinct states of the obseiving subject
(and possibly distinct outputs). In other words, the observing subject
can make a choice based on the observed information, and that choice
manifests itself in the resulting state of the observer.
Modification may be defined in terms of observation. A subject
modifies information if its value is changed so that an observation,
by a subject (possibly distinct from the modifier), results in a
different state than previous observations (a discernable change).



Security Policy
The protection pollcies invest'gated, to date, have addressed
the problem of information security. Security denotes the property
of protection against compromise: unauthorized dissemination of
information. The security policy defines access domains of subjects
based on considerations derived from DoD security attributes of subjects
and objects. Several axiomatic systems [2] [3] represent this
policy. We present a model defining this policy below.
Post: #2
:sReally,really want it!!!

Really want it...

More,more ,more...
Post: #3
INTEGRITY CONSIDERATIONS FOR SECURE COMPUTER SYSTEMS
Post: #4
An integrity policy defines formal access restrictions that, if implemented effectively, protect data from incorrect modifications. The author identifies integrity issues posed by a secure military computer utility. Integrity policies are developed that address these problems and evaluate their effectiveness. A prototype secure computer utility, Multics, is then used as a test bench for the application of developed access controls.
 

Marked Categories : contact integrity com loc es, integrity considerations for secure computer systems pdf, integrity considerations for secure,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  computer application practical lab manual in diploma Guest 1 187 18-11-2017 11:26 AM
Last Post: jaseela123
  rnsit notes of computer science 7th sem 2014 Guest 1 476 18-11-2017 10:12 AM
Last Post: jaseela123
  threat to a computer both hardware and software remedies ppt Guest 1 236 17-11-2017 02:40 PM
Last Post: jaseela123
  word hunt questions in computer Guest 1 322 17-11-2017 12:09 PM
Last Post: jaseela123
  unrestricted simplex protocol in computer network in c program Guest 1 0 25-10-2017 04:25 PM
Last Post: jaseela123
  human computer interface based on visual lip movement and gesture recognition ppt Guest 1 676 14-10-2017 02:52 PM
Last Post: jaseela123
  fabrication of cooling tower with power generation systems paper Guest 1 327 14-10-2017 01:31 PM
Last Post: jaseela123
  computer hardware networking company profile format Guest 1 241 14-10-2017 09:53 AM
Last Post: jaseela123
Smile control systems vtu notes for 4th sem ece doc Guest 1 377 14-10-2017 09:44 AM
Last Post: jaseela123
  seminar documentation on computer virus Guest 1 244 12-10-2017 02:43 PM
Last Post: jaseela123
This Page May Contain What is INTEGRITY CONSIDERATIONS FOR SECURE COMPUTER SYSTEMS And Latest Information/News About INTEGRITY CONSIDERATIONS FOR SECURE COMPUTER SYSTEMS,If Not ...Use Search to get more info about INTEGRITY CONSIDERATIONS FOR SECURE COMPUTER SYSTEMS Or Ask Here

Options: