Data Integrity Limitations in in Hybrid Security Architectures
نویسندگان
چکیده
We discuss a class of computer/network architectures that supports multilevel security and commercial applications, while utilizing primarily commercial-off-the-shelf (COTS) workstations, operating systems and hardware components. We show that a property of these architectures is that, while they are capable of supporting multilevel confidentiality policies, they do not generally support partially ordered integrity policies: specifically, these architectures do not support the maintenance of data that is higher in integrity than the integrity level of the COTS components, thus limiting their applicability to processing environments where the integrity of data is consistent with that of low-assurance software.
منابع مشابه
Data Integrity Limitations in Highly Secure Systems
We discuss a class of computer/network architectures that supports multilevel security while utilizing commercial-off-the-shelf (COTS) workstations and COTS productivity software applications. We show that a property of these architectures is that, while supporting multilevel confidentiality policies, they do not generally support partially ordered integrity policies: specifically, these archit...
متن کاملImproving the performance of financial forecasting using different combination architectures of ARIMA and ANN models
Despite several individual forecasting models that have been proposed in the literature, accurate forecasting is yet one of the major challenging problems facing decision makers in various fields, especially financial markets. This is the main reason that numerous researchers have been devoted to develop strategies to improve forecasting accuracy. One of the most well established and widely use...
متن کاملA cautionary note regarding the data integrity capacity of certain secure systems
The need to provide standard commercial-grade productivity applications as the general purpose user interface to high-assurance data processing environments is compelling, and has resulted in proposals for several di erent types of \trusted" systems. We characterize some of these systems as a class of architecture. We discuss the general integrity property that systems can only be trusted to ma...
متن کاملA survey of Hardware-based Control Flow Integrity (CFI)
Control Flow Integrity (CFI) is a computer security technique that detects runtime attacks by monitoring a program’s branching behavior. This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures. The goal is to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies. We show that many a...
متن کاملIntrusion Detection based on a Novel Hybrid Learning Approach
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...
متن کامل