The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Integrity Considerations for Secure Computer Systems

Author

K. J. Biba

Entry type

techreport

Abstract

An integrity policy defines formal access constraints which, if effectively enforced, protect data from improper modification. We indentify the integrity problems posed by a secure military computer utility. Integrity policies addressing these problems are developed and their effectiveness evaluated. A prototype secure computer utility, Multics, is then used as a testbed for the application of the developed access controls.

Date

1977 – 04

Edition

ESD-TR-76-372

Institution

MITRE Corp.

Key alpha

Biba

Organization

MITRE Corp.

Pages

66

Publication Date

1977-04-01

Contents

I. Introduction II. The integrity problem III. Integrity policy IV. Application V. Conclusion

Keywords

Computer Model, Computer Security, Data Integrity, Integrity Mechanisms, Integrity Model, Program Integrity

Language

English

Location

A hard-copy of this is in the CERIAS Library

Subject

Data integrity

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.