Increasingly,organizations are developing sophisticated computing systems on whose services they need to place great trust. Inmany circumstances the focus will be made on different properties of such services - e.g., on the integrity, on the average realtimeresponse achieved, or on the degree to which deliberate intrusions can be prevented. Simultaneous consideration of availabilityand integrity provides a very convenient means of subsuming these various concerns within a single conceptual framework.It also provides the means of addressing the problem of an appropriate balance of these properties. The Lattice model, ChineseWall policy, and Groschs law are central to the understanding and mastering of our model. The model provided forachieving availability and integrity is extremely useful, as before those attributes have been considered much more orthogonal toeach other, and the development of any real system should have performed trade offs. The model enables the more classical notionsof integrity, availability, and confidentiality to be put into perspective.
Download file
Counter downloads: 93
- Title MODERN MODELS AND MECHANISMS IN INFORMATION SECURITY
- Headline MODERN MODELS AND MECHANISMS IN INFORMATION SECURITY
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 1(1)
- Date:
- DOI
Keywords
эффективность доступа , закон Гроша , мандатный контроль и управление доступом Authors
References
Brewer D.F.C., Nash M.J. The Chinese Wall Security Policy: IEEE Symposium on Security and Privacy. 1989. P. 215 - 228.
Gardner W.D. Author of Grosch's Law Going Strong At 87: TechWeb Technology News: <techweb.com/wire/networking/>160701379/
McLean J. Secure models, Encyclopedia of software engineering. 1994.
LaPadula L., Bell D. Secure Computer System: Mathematical Foundation, ESD-TR-73-278. V.l, MITRE Corporation.
Зегжда П.Д. Теория и практика обеспечения информационной безопасности. М.: Яхтсмен, 1996.
Стандарт Банка России СТО БР ИББС-1.0-2006 Обеспечение информационной безопасности организаций банковской системы Российской Федерации.
Корт С.С. Теоретические основы защиты информации: Учеб. пособие. М.: Гелиос АРВ, 2004.
Олифер В.Г., Олифер Н.А. Компьютерные сети. Принципы, технологии, протоколы. Питер, 2007.

MODERN MODELS AND MECHANISMS IN INFORMATION SECURITY | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2008. № 1(1).
Download full-text version
Download fileCounter downloads: 673