{"title":"Integrity and security in AM/FM-GIS","authors":"E. Orlandi","doi":"10.1109/CCST.1993.386801","DOIUrl":null,"url":null,"abstract":"The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1993.386801","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<>