Abstract
This paper deals with a new model of an information system. The model is strongly oriented to security problems and in particular it takes in account all the three parameters of availability, integrity and secrecy as stated in [4]. To represent the system, the model defines entities for the system objects, actions for the interactions between them and activities for the system's functionalities.
Based on this model a tool has been created to implement it. Using this tool a system administrator can describe the system, discover security problems, make queries and perform non-intrusive security checks. This tool and the model which it is based on respond to the need for an advanced security management in an information system both of small and of large dimensions. This work was born to meet the network and security administrators needs collected in a preliminary interviewing phase.
Preview
Unable to display preview. Download preview PDF.
References
Bussolati U., Fugini N., Martella G.:A conceptual framework for security systems: the action-entity model,IFIP (1983)
Bell D.E., La Padula L.J.:Secure computer systems: mathematical foundations and model,ESD-TR-73-278
Castano S., Fugini M., Martella G.:Database security,Addison Wesley (1995)
Curry D., Longstaff T. et al.:Site Security Handbook. Network Working Group,Request for Comments 1244 (1991)
Computer Security-Esorics 96. 4th European Symposium on Research in Computer Security,proceedings (1996)
Fugini M.G., Bellinzona R., Martella G.An Authorisation mechanism for Unixbased Cooperative Environments,Information Systems Vol. 16 No. 5 Pergamon Press (1991)
Landwehr C.E.:Formal models for computer security,ACM Computing Surveys 13 (3) (1981)
Siyan K., Hare CAnternet Firewalls and Network Security, New Riders Publishing (1995)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
De Maria, P., De Mei, C. (1998). ISCM information system conceptual model oriented to security problems and a tool implementing it. In: Masunaga, Y., Katayama, T., Tsukamoto, M. (eds) Worldwide Computing and Its Applications — WWCA'98. WWCA 1998. Lecture Notes in Computer Science, vol 1368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-64216-1_55
Download citation
DOI: https://doi.org/10.1007/3-540-64216-1_55
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64216-9
Online ISBN: 978-3-540-69704-6
eBook Packages: Springer Book Archive