COMPARISON OF COMMERCIAL AND MILITARY COMPUTER SECURITY POLICIES.

675Citations
Citations of this article
254Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The authors present a policy for data integrity based on commercial data processing practices, and compare the mechanisms needed for this policy with the mechanisms needed to enforce the lattice model for information security. It is argued that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to control disclosure and to provide integrity.

Cite

CITATION STYLE

APA

Clark, D. D., & Wilson, D. R. (1987). COMPARISON OF COMMERCIAL AND MILITARY COMPUTER SECURITY POLICIES. In Proceedings of the Symposium on Security and Privacy (pp. 184–194). IEEE. https://doi.org/10.1109/sp.1987.10001

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free