Secure computing: threats and safeguards
Secure computing: threats and safeguards
C2 secure database management systems—a comparative study
Proceedings of the 1999 ACM symposium on Applied computing
A security domain model to assess software for exploitable covert channels
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
A security policy model for clinical information systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.00 |
Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. In this work, we focus on the integrity aspect of commercial security applications by exploring the nature and scope of the famous integrity policy - the Clinical Information Systems Policy. We model it and check its consistency using the Alloy Analyzer.