Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Clark–Wilson model"'
Autor:
Daniel Wiechecki
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 66, Iss No 3, Pp 499-505 (2020)
This paper introduces security assessment methodology for isolated single-workstation multilayer systems processing sensitive or classified data according with a corresponding security model for such system. The document provides a high-level tool fo
Externí odkaz:
https://doaj.org/article/9c532c55137f439990ebc47e56610b91
Publikováno v:
Applied Sciences, Vol 11, Iss 18, p 8781 (2021)
The objective of the paper was to reveal the main techniques and means of ensuring the integrity of data and persistent stored database modules implemented in accordance with the recommendations of the Clark–Wilson model as a methodological basis f
Externí odkaz:
https://doaj.org/article/ae623bb3bd84438490c7a973cb9269b0
Autor:
Kelsey Harley, Rodney H. Cooper
Publikováno v:
ACM Computing Surveys. 54:1-35
The understanding and promotion of integrity in information security has traditionally been underemphasized or even ignored. From implantable medical devices and electronic voting to vehicle control, the critical importance of information integrity t
Publikováno v:
Applied Sciences, Vol 11, Iss 8781, p 8781 (2021)
The objective of the paper was to reveal the main techniques and means of ensuring the integrity of data and persistent stored database modules implemented in accordance with the recommendations of the Clark–Wilson model as a methodological basis f
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Paweł Buława, Marcin Kowalczyk
Publikováno v:
Challenges of Modern Technology. 7:16-19
This paper presents the theoretical issues of data security in information systems, a practical implementation of the Clark-Wilson model on the example of Business Intelligence tool, performing the function of a telecommunications operator sales modu
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Meihui Shen, Jing Jin
Publikováno v:
2012 International Conference on Management of e-Commerce and e-Government.
The core of the multilevel security policy is to divide information into different security levels, and to adopt different protection measures according to the security level. This policy is widely used in military field and business environment. Thi
Autor:
Edward G. Amoroso, Leonard J. LaPadula, Marshall D. Abrams, Teresa F. Lunt, James G. Williams
Publikováno v:
Computers & Security. 12:679-689
This paper describes issues and results obtained in the context of an integrity research study group. A specification and modeling taxonomy is shown to provide a framework for the group's integrity discussions and investigations. In particular, the C