An integrity policy defines the situations when modification of information is authorized and is enforced by the security mechanisms of the system. However, in a complex application system it is possible that an integrity policy may have been incorrectly specified and, as a result, a user may be authorized to modify information that can lead to an unexpected system compromise. In this paper we propose a scalable and quantitative technique that uses constraint solving to model and analyze the effectiveness of application system integrity policies. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Bistarelli, S., & Foley, S. N. (2003). A constraint framework for the qualitative analysis of dependability goals: Integrity. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2788, 130–143. https://doi.org/10.1007/978-3-540-39878-3_11
Mendeley helps you to discover research relevant for your work.