1987 IEEE Symposium on Security and Privacy 1987
DOI: 10.1109/sp.1987.10001
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Commercial and Military Computer Security Policies

Abstract: Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to provide control of classified information. However, for that core of data processing concerned with business operation and control of assets, the primary security concern is data integrity. This paper presents a policy for data integrity based on commercial data processing practices, and compares the mechanisms needed for this policy with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
401
0
13

Year Published

1995
1995
2010
2010

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 792 publications
(414 citation statements)
references
References 3 publications
0
401
0
13
Order By: Relevance
“…It is preferable however that utility side systems enforce proper user and group management to provide properties such as separation of duties [5].…”
Section: Attacker Modelmentioning
confidence: 99%
“…It is preferable however that utility side systems enforce proper user and group management to provide properties such as separation of duties [5].…”
Section: Attacker Modelmentioning
confidence: 99%
“…They allow a policy designer to express higher-level organisational security policies. Depending on the organisation, different kinds of authorisation constraints are required such as SoD in the banking field [5] or constraints on delegation and context constraints in the healthcare domain [24]. Later in this paper, different kinds of authorisation constraints are specified and discussed.…”
Section: Rbac and Authorisation Constraintsmentioning
confidence: 99%
“…This directive among other areas applies to clinical information systems where in particular the principle of patient consent must be enforced [4]. In contrast, in the banking domain other security requirements such as data integrity are more important such that often separation of duty policies (SoD) [17,5] must be enforced.…”
Section: Introductionmentioning
confidence: 99%
“…And dynamic policies are very important for many trust-related applications. In particular, things like separation of duties [7,10], the so called Chinese Wall (CW) policy [5], and the effects of the expiration or revocation of a certificate on the power of an agent holding it [2], are all dynamic. Dynamic policies are particularly important for fostering regularity-based trust in electronic commerce, as we will illustrate via an example in the following section.…”
Section: Introductionmentioning
confidence: 99%