The authors present a policy for data integrity based on commercial data processing practices, and compare the mechanisms needed for this policy with the mechanisms needed to enforce the lattice model for information security. It is argued that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to control disclosure and to provide integrity.
CITATION STYLE
Clark, D. D., & Wilson, D. R. (1987). COMPARISON OF COMMERCIAL AND MILITARY COMPUTER SECURITY POLICIES. In Proceedings of the Symposium on Security and Privacy (pp. 184–194). IEEE. https://doi.org/10.1109/sp.1987.10001
Mendeley helps you to discover research relevant for your work.