Title :
Assuring system data integrity-an overview
Author_Institution :
Bellcore, Piscataway, NJ, USA
Abstract :
The author explores a number of approaches and techniques for detecting, correcting, recovering from, and preventing system data integrity problems associated with security breaches, environmental hazards, human error, and system malfunction due to hardware/software defect or failure. He starts out with a description of some techniques for detecting compromised data integrity resulting from both fraudulent (intended) and nonfraudulent (unintended) data corruption. Emphasis is placed on three general approaches: (1) building in system quality for preventing certain of these problems, (2) placing routines into data systems for detecting problems that cannot be prevented, and (3) designing functionality into these systems for recovering from compromised integrity. The author examines how selected system features and functionality are designed to help ensure data integrity. The role of the system in assuring data integrity is examined
Keywords :
data integrity; data privacy; fault tolerant computing; security of data; software reliability; system recovery; environmental hazards; fraudulent/nonfraudulent data corruption; functionality design; hardware/software defect; human error; security breaches; software quality; system data integrity problems; system malfunction; Buildings; Computer hacking; Data security; Data systems; Error correction; Hardware; Hazards; Humans; Protection;
Conference_Titel :
Global Telecommunications Conference and Exhibition 'Communications Technology for the 1990s and Beyond' (GLOBECOM), 1989. IEEE
Conference_Location :
Dallas, TX
DOI :
10.1109/GLOCOM.1989.63970