A Formal Integrity Framework with Application to a Secure Information ATM (SIATM)

Abstract : Information Security is traditionally treated in three main categories: Confidentiality, Integrity, and Availability. While much work has been done on modelling Confidentiality and Availability, aspects involving comprehensive modelling and quality of data integrity in complex systems appear to be, on a relative scale, much less well understood and implemented. Further, most work on Integrity and resultant implementations seems to have focussed more on a matters related to source authentication and transmission assurance. However, the quality of data aspect is becoming more critical for attention, given the increasing levels of automation of information fusion and data transformation in a globalised Cyberspace. In this paper, we survey the existing integrity models and identify shortcomings of these with regard to a general integrity framework encompassing the quality of data aspect. We then propose and formally model a new framework, illustrating the approach with reference to use cases built around the Secure Information ATM (SIATM) - a highly accreditable security system currently under development.

[1]  Sihan Qing,et al.  A Practical Alternative to Domain and Type Enforcement Integrity Formal Models , 2006, Inscrypt.

[2]  Liang Hong-liang,et al.  Hybrid Mandatory Integrity Model Composed of Biba and Clark-Wilson Policy , 2010 .

[3]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[4]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[5]  Jun Zhang,et al.  Research of BLP and Biba dynamic union model based on check domain , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[6]  Hsiang-Chuan Liu A completed partial order of ordered semi-vector space of intuitionistic fuzzy values , 2010 .

[7]  Steven B. Lipner,et al.  Non-Discretionery Controls for Commercial Applications , 1982, 1982 IEEE Symposium on Security and Privacy.

[8]  Tao Wang,et al.  An Integrity Control Model for Operating System , 2009, 2009 International Conference on Management and Service Science.

[9]  K J Biba,et al.  Integrity Considerations for Secure Computer Systems , 1977 .

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Dengguo Feng,et al.  BIFI: Architectural Support for Information Flow Integrity Measurement , 2008, 2008 International Conference on Computer Science and Software Engineering.

[12]  G. Vargo The Atomic Chef???and Other True Tales of Design, Error, and Human Technology , 2006 .

[13]  Régine Laleau,et al.  Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment , 2004, CAiSE.

[14]  Yeping He,et al.  A formal model for integrity protection based on DTE technique , 2006, Science in China Series F: Information Sciences.

[15]  Mingxi Zhang,et al.  Strict Integrity Policy of Biba Model with Dynamic Characteristics and its Correctness , 2009, 2009 International Conference on Computational Intelligence and Security.

[16]  Dorothy E. Denning,et al.  The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[17]  Anneli Folkesson,et al.  Secure Computer Systems , 2013 .

[18]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[19]  Zhou-Yi Zhou,et al.  Hybrid Mandatory Integrity Model Composed of Biba and Clark-Wilson Policy: Hybrid Mandatory Integrity Model Composed of Biba and Clark-Wilson Policy , 2010 .