Advertisement

Introduction

  • Vijay Atluri
  • Sushil Jajodia
  • Binto George
Part of the Advances in Database Systems book series (ADBS, volume 16)

Abstract

Information security has become increasingly important with the advent of computers to process sensitive information. Secrecy, integrity and availability are considered as inherent components of computer security. Secrecy is concerned with protection of information against unauthorized disclosure; integrity is concerned with prevention of improper modification of information; and availability of service involves ensuring that all computer resources are available to the users whenever they are needed. Secrecy, also known as confidentiality, is more understood in the security community than the other two components of security.

Keywords

Trojan Horse Transaction Processing Covert Channel Personal Item Security Class 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2000

Authors and Affiliations

  • Vijay Atluri
    • 1
  • Sushil Jajodia
    • 2
  • Binto George
    • 3
  1. 1.Rutgers UniversityUSA
  2. 2.George Mason UniversityUSA
  3. 3.Western Illinois UniversityUSA

Personalised recommendations