DocumentCode
4181
Title
Conflicts Among the Pillars of Information Assurance
Author
Wilson, Kelce S.
Volume
15
Issue
4
fYear
2013
fDate
July-Aug. 2013
Firstpage
44
Lastpage
49
Abstract
Interactions between the five pillars of information assurance-availability, integrity, authentication, confidentiality, and nonrepudiation-can be problematic. Measures taken to further the goal of one pillar are often blind to the needs of another pillar. The author explores such interactions using graphical forms to better represent conflicts. For example, availability might introduce conflicts with confidentiality, integrity and authentication, but confidentiality and integrity are largely complementary. This article is part of a special issue on security.
Keywords
data integrity; security of data; data authentication; data availability; data confidentiality; data integrity; data security; graphical forms; information assurance; nonrepudiation; Asynchronous transfer mode; Authentication; Authorization; Information processing; Quality assurance; US Department of Defense; information assurance; information technology; security;
fLanguage
English
Journal_Title
IT Professional
Publisher
ieee
ISSN
1520-9202
Type
jour
DOI
10.1109/MITP.2012.24
Filename
6152082
Link To Document