DocumentCode :
4181
Title :
Conflicts Among the Pillars of Information Assurance
Author :
Wilson, Kelce S.
Volume :
15
Issue :
4
fYear :
2013
fDate :
July-Aug. 2013
Firstpage :
44
Lastpage :
49
Abstract :
Interactions between the five pillars of information assurance-availability, integrity, authentication, confidentiality, and nonrepudiation-can be problematic. Measures taken to further the goal of one pillar are often blind to the needs of another pillar. The author explores such interactions using graphical forms to better represent conflicts. For example, availability might introduce conflicts with confidentiality, integrity and authentication, but confidentiality and integrity are largely complementary. This article is part of a special issue on security.
Keywords :
data integrity; security of data; data authentication; data availability; data confidentiality; data integrity; data security; graphical forms; information assurance; nonrepudiation; Asynchronous transfer mode; Authentication; Authorization; Information processing; Quality assurance; US Department of Defense; information assurance; information technology; security;
fLanguage :
English
Journal_Title :
IT Professional
Publisher :
ieee
ISSN :
1520-9202
Type :
jour
DOI :
10.1109/MITP.2012.24
Filename :
6152082
Link To Document :
بازگشت