Chapter 6. Integrity Policies

 

ISABELLA: Some one with child by him? My cousin Juliet?LUCIO: Is she your cousin?ISABELLA: Adoptedly; as school-maids change their namesBy vain, though apt affection.

 
 --Measure for Measure, I, iv, 45–48.

An inventory control system may function correctly if the data it manages is released; but it cannot function correctly if the data can be randomly changed. So integrity, rather than confidentiality, is key. Integrity policies focus on integrity rather than confidentiality, because most commercial and industrial firms are more concerned with accuracy than disclosure. In this chapter we discuss the major integrity security policies and explore their design.

Goals

Commercial requirements differ from military requirements ...

Get Computer Security: Art and Science now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.