Applying The Biba Integrity Model to Evidence Management
نویسندگان
چکیده
This paper describes the design of an integrity-aware Forensic Evidence Management System (FEMS). The well-known Biba integrity model is employed to preserve and reason about the integrity of stored evidence. Casey’s certainty scale provides the integrity classification scheme needed to apply the Biba model. The paper also discusses the benefits of using an integrity-aware system for managing digital evi-
منابع مشابه
An Approach to Automated Verification of Multi-Level Security System Models
In the paper the approach to the multi-level security (MLS) system models verification is presented. The proposed approach to analyze properties of MLS security-design models and their instances reduces deduction to models evaluation and simulation. In the work the MlsML profile was developed with possibility of the confidentiality or integrity verification on the base of BellLaPadula or Biba m...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملVerification of a Formal Security Model for Multiapplicative Smart Cards
We present a generic formal security model for operating systems of multiapplicative smart cards. The model formalizes the main security aspects of secrecy, integrity, secure communication between applications and secure downloading of new applications. The model satisfies a security policy consisting of authentication and intransitive noninterference. The model extends the classical security m...
متن کاملEstablishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques simply assert the identity of software, but provide no indication of the ongoing status of the system or its data. As a result, a number of significant vulnerabilities can result if the system is not configured and manag...
متن کاملTowards Generating a Data Integrity Standard
The tremendous growth in size, complexity and value of the organizationÕs data resources has given rise to an urgent need for a data integrity standard that will provide a consensus de®nition, a common measure and a set of tools for evaluating the various models and mechanisms in this domain. This paper attempts to pave the way for such a data integrity standard. It discusses various de®nitions...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007