Unit 6-2 Integrity Model [Compatibility Mode]

Unit 6-2 Integrity Model [Compatibility Mode] - 12/19/2010...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 12/19/2010 1 Unit 6: Integrity Models Unit 6: Integrity Models Part 2 Click Here to Start Audio Clark and Wilson Integrity Clark and Wilson Integrity c Clark and Wilson - 1987 Symposium on Security and Privacy c Claim that Integrity is More Important than Secrecy in Commercial Systems c Motivated by Accounting Rules C&W Basic Ideas C&W Basic Ideas c Unconstrained vs. Constrained Data (CDI) c CDI only manipulated by well- formed transformations. c Users collaborate to manipulate data or collude to breach security. c All transformations must be logged. 12/19/2010 2 Accounting Principles Accounting Principles c Independent Audit Verifies Internal Consistency Verifies External Reality c Double Entry Bookkeeping Separation of Duty Separation of Duty c Defining user roles so that no one user can commit a significant error without detection (e.g., order, accept goods, and pay) c Requires collusion....
View Full Document

This note was uploaded on 02/20/2011 for the course TECH 7375 taught by Professor June during the Spring '11 term at University of Arkansas for Medical Sciences.

Page1 / 5

Unit 6-2 Integrity Model [Compatibility Mode] - 12/19/2010...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online