Abstract
The paper addresses to the technique of integrity control based on security settings evaluation which is made over variable software components. There are formal foundations of integrity control related to finding security settings which form trusted security environment. It also uses iterative search for security settings which are compatible and agreed with each other. Our approach results to a schema of Security and Integrity Control System that combines principles of automated control system and security management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ISO/IEC 15408: Information technology. Security techniques. Evaluation criteria for IT security (2005)
Trusted Solaris, http://www.sun.com/software/solaris/trustedsolaris
HPUX, http://docs.hp.com
GRSecurity, http://grsecurity.org
Astaro Security Gateway, http://www.astaro.com/our_products/astaro_security_gateway
Alves-Foss, J., Taylor, C., Oman, P.: A multi-layered approach to security in high assurance system development. In: Proc. of 37th Annual Hawaii Intl. Conf. on System Science (HICSS-37), Hawaii (2004)
Stefani, R.T., et al.: Design of Feedback Control Systems. Oxford University Press, Oxford (2001)
Dorf, R.C., Bishop, R.H.: Modern Control Systems. Prentice Hall, Englewood Cliffs (2007)
ISO/IEC 17799: Information technology. Security techniques. Code of practice for information security management (2005)
Dillard, K., Maldonado, J., Warrender, B.: Microsoft Solutions for Security. Windows Server 2003 Security Guide. Microsoft (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zegzhda, D.P., Zegzhda, P.D., Kalinin, M.O. (2010). Clarifying Integrity Control at the Trusted Information Environment. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2010. Lecture Notes in Computer Science, vol 6258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14706-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-14706-7_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14705-0
Online ISBN: 978-3-642-14706-7
eBook Packages: Computer ScienceComputer Science (R0)