Title :
Integrity controls for military and commercial applications
Author :
Jueneman, Robert R.
Author_Institution :
Comput. Sci. Corp., Falls Church, VA, USA
Abstract :
Because it is generally not possible to prevent the destruction or alteration of data when objects are stored or transmitted outside the security perimeter of a TCB (trusted computer base), the emphasis is placed on detecting any illicit data, including the results of computer viruses and Trojan Horse programs, using cryptographic checksums and digital signature techniques. It is concluded that a mandatory integrity policy consisting of the Biba hierarchical integrity policy extended to include integrity categories and multilevel integrity-trusted subjects, plus a discretionary integrity policy that uses a digital signature mechanism incorporated in a file label to indicate who created or produced that file, can provide integrity controls very well-suited to the networking environment
Keywords :
computer networks; cryptography; military computing; security of data; Biba hierarchical integrity policy; Trojan Horse programs; commercial applications; computer viruses; cryptographic checksums; data alteration; data destruction; digital signature techniques; discretionary integrity policy; file label; illicit data; integrity controls; large unsecured networks; multilevel integrity-trusted subjects; networking environment; trusted computer base; Application software; Command and control systems; Communication system control; Computer networks; Computer security; Data security; Digital signatures; Error correction; Floppy disks; Military computing;
Conference_Titel :
Aerospace Computer Security Applications Conference, 1988., Fourth
Print_ISBN :
0-8186-0895-1
DOI :
10.1109/ACSAC.1988.113351