• DocumentCode
    4181
  • Title

    Conflicts Among the Pillars of Information Assurance

  • Author

    Wilson, Kelce S.

  • Volume
    15
  • Issue
    4
  • fYear
    2013
  • fDate
    July-Aug. 2013
  • Firstpage
    44
  • Lastpage
    49
  • Abstract
    Interactions between the five pillars of information assurance-availability, integrity, authentication, confidentiality, and nonrepudiation-can be problematic. Measures taken to further the goal of one pillar are often blind to the needs of another pillar. The author explores such interactions using graphical forms to better represent conflicts. For example, availability might introduce conflicts with confidentiality, integrity and authentication, but confidentiality and integrity are largely complementary. This article is part of a special issue on security.
  • Keywords
    data integrity; security of data; data authentication; data availability; data confidentiality; data integrity; data security; graphical forms; information assurance; nonrepudiation; Asynchronous transfer mode; Authentication; Authorization; Information processing; Quality assurance; US Department of Defense; information assurance; information technology; security;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2012.24
  • Filename
    6152082