Skip to main content

ISCM information system conceptual model oriented to security problems and a tool implementing it

  • Session B-4: Intereculture Technology
  • Conference paper
  • First Online:
Worldwide Computing and Its Applications — WWCA'98 (WWCA 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1368))

Included in the following conference series:

  • 117 Accesses

Abstract

This paper deals with a new model of an information system. The model is strongly oriented to security problems and in particular it takes in account all the three parameters of availability, integrity and secrecy as stated in [4]. To represent the system, the model defines entities for the system objects, actions for the interactions between them and activities for the system's functionalities.

Based on this model a tool has been created to implement it. Using this tool a system administrator can describe the system, discover security problems, make queries and perform non-intrusive security checks. This tool and the model which it is based on respond to the need for an advanced security management in an information system both of small and of large dimensions. This work was born to meet the network and security administrators needs collected in a preliminary interviewing phase.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bussolati U., Fugini N., Martella G.:A conceptual framework for security systems: the action-entity model,IFIP (1983)

    Google Scholar 

  2. Bell D.E., La Padula L.J.:Secure computer systems: mathematical foundations and model,ESD-TR-73-278

    Google Scholar 

  3. Castano S., Fugini M., Martella G.:Database security,Addison Wesley (1995)

    Google Scholar 

  4. Curry D., Longstaff T. et al.:Site Security Handbook. Network Working Group,Request for Comments 1244 (1991)

    Google Scholar 

  5. Computer Security-Esorics 96. 4th European Symposium on Research in Computer Security,proceedings (1996)

    Google Scholar 

  6. Fugini M.G., Bellinzona R., Martella G.An Authorisation mechanism for Unixbased Cooperative Environments,Information Systems Vol. 16 No. 5 Pergamon Press (1991)

    Google Scholar 

  7. Landwehr C.E.:Formal models for computer security,ACM Computing Surveys 13 (3) (1981)

    Google Scholar 

  8. Siyan K., Hare CAnternet Firewalls and Network Security, New Riders Publishing (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yoshifumi Masunaga Takuya Katayama Michiharu Tsukamoto

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

De Maria, P., De Mei, C. (1998). ISCM information system conceptual model oriented to security problems and a tool implementing it. In: Masunaga, Y., Katayama, T., Tsukamoto, M. (eds) Worldwide Computing and Its Applications — WWCA'98. WWCA 1998. Lecture Notes in Computer Science, vol 1368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-64216-1_55

Download citation

  • DOI: https://doi.org/10.1007/3-540-64216-1_55

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64216-9

  • Online ISBN: 978-3-540-69704-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics