The conflict between confidentiality and integrity

The author discusses the relationship between confidentiality controls, integrity controls and security. There are two kinds of integrity control, defensive checks and voting, and confidentiality controls are an example of automated voting. He discusses polyinstantiation and database security. He looks at SWORD designed for databases. Polyinstantiation is only unavoidable when an operating system's security controls are used to build a secure database.<<ETX>>