{"title":"通过安全功能实现商业数据完整性","authors":"P. Karger","doi":"10.1109/SECPRI.1988.8105","DOIUrl":null,"url":null,"abstract":"The author examines the model of D.D. Clark and D.R. Wilson (1987) for commercial data integrity and proposes an implementation based on his own secure capability architecture. He shows how secure capabilities and protected subsystems are ideal for implementing commercial data integrity, but also indicates areas where the Clark-Wilson model may have difficulties in actual use. The level of formal verification required appears higher than would be feasible for most commercial systems and the user interface for specifying separation of duties appears extremely complex.<<ETX>>","PeriodicalId":131674,"journal":{"name":"Proceedings. 1988 IEEE Symposium on Security and Privacy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"52","resultStr":"{\"title\":\"Implementing commercial data integrity with secure capabilities\",\"authors\":\"P. Karger\",\"doi\":\"10.1109/SECPRI.1988.8105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The author examines the model of D.D. Clark and D.R. Wilson (1987) for commercial data integrity and proposes an implementation based on his own secure capability architecture. He shows how secure capabilities and protected subsystems are ideal for implementing commercial data integrity, but also indicates areas where the Clark-Wilson model may have difficulties in actual use. The level of formal verification required appears higher than would be feasible for most commercial systems and the user interface for specifying separation of duties appears extremely complex.<<ETX>>\",\"PeriodicalId\":131674,\"journal\":{\"name\":\"Proceedings. 1988 IEEE Symposium on Security and Privacy\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1988-04-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"52\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. 1988 IEEE Symposium on Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECPRI.1988.8105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1988 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECPRI.1988.8105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementing commercial data integrity with secure capabilities
The author examines the model of D.D. Clark and D.R. Wilson (1987) for commercial data integrity and proposes an implementation based on his own secure capability architecture. He shows how secure capabilities and protected subsystems are ideal for implementing commercial data integrity, but also indicates areas where the Clark-Wilson model may have difficulties in actual use. The level of formal verification required appears higher than would be feasible for most commercial systems and the user interface for specifying separation of duties appears extremely complex.<>