John Melrose, K. Wrona, Thomas Guenther, Raymond Haakseth, N. Nordbotten, Lars Westerdahl
{"title":"标签的完整性和可用性","authors":"John Melrose, K. Wrona, Thomas Guenther, Raymond Haakseth, N. Nordbotten, Lars Westerdahl","doi":"10.1109/ICMCIS.2016.7496583","DOIUrl":null,"url":null,"abstract":"While information assurance recognizes confidentiality, integrity and availability as properties of information that need to be protected, the use of security metadata has historically been well understood only for protecting confidentiality. In the case of integrity and availability, while the need for their protection is recognized, little attention has been paid to how metadata could be used to describe the required degrees of protection. The research problem addressed by this paper is how to understand the characteristics of integrity and availability in an information security context and identify the necessary metadata elements of each.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Labelling for integrity and availability\",\"authors\":\"John Melrose, K. Wrona, Thomas Guenther, Raymond Haakseth, N. Nordbotten, Lars Westerdahl\",\"doi\":\"10.1109/ICMCIS.2016.7496583\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While information assurance recognizes confidentiality, integrity and availability as properties of information that need to be protected, the use of security metadata has historically been well understood only for protecting confidentiality. In the case of integrity and availability, while the need for their protection is recognized, little attention has been paid to how metadata could be used to describe the required degrees of protection. The research problem addressed by this paper is how to understand the characteristics of integrity and availability in an information security context and identify the necessary metadata elements of each.\",\"PeriodicalId\":103155,\"journal\":{\"name\":\"2016 International Conference on Military Communications and Information Systems (ICMCIS)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Military Communications and Information Systems (ICMCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMCIS.2016.7496583\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMCIS.2016.7496583","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
While information assurance recognizes confidentiality, integrity and availability as properties of information that need to be protected, the use of security metadata has historically been well understood only for protecting confidentiality. In the case of integrity and availability, while the need for their protection is recognized, little attention has been paid to how metadata could be used to describe the required degrees of protection. The research problem addressed by this paper is how to understand the characteristics of integrity and availability in an information security context and identify the necessary metadata elements of each.