Security means that a user may only access a subset of the total information, namely that informationfor which access permission has been granted. lntegrity concerns the correctness of the information. The implementation of security means that integrity must not only be consideredfor all information in the system, but also for each subset which a user may access. We propose an information organizational structure and policy which permits security criteria to be specified for constraints and supports multi-user integrity, ie. integrity of the whole knowledge base as well as integrity of each user's subset of the knowledge base. Our approach specifies an area of the knowledge base for those objects which meet the integrity constraints for a ...
The article outlines the concept of maintaining the required security level of the information syste...
The security of knowledge is of extreme importance to any organisation, as organizations are increas...
Information security is of utmost concern in a multiuser environment. The importance of security is ...
Security and integrity are frequently competing characteristics in an information system. Sectirity ...
Data bases are one of the most important components in every large informatics system which stores a...
Data bases are one of the most important components in every large informatics system which stores a...
The main feature of a secure information system is protecting sensitive data and services of an orga...
Knowledge management can exploit the new opportunities offered by computer networks and pursue its g...
The objective of the paper was to reveal the main techniques and means of ensuring the integrity of ...
Abstract Confidentiality, Integrity and Availability are referred to as the basic principles of Info...
Information has become a very important asset in most organizations today. For this reason, it is im...
AbstractTo reduce the risk of loss and destruction of information stored in a database, the manageme...
Information integrity is a vital security property in a variety of applications. However, there is m...
Abstract. Information integrity policies are traditionally enforced by access control mechanisms tha...
Exfiltration of sensitive data and intellectual property theft have increased to a significant level...
The article outlines the concept of maintaining the required security level of the information syste...
The security of knowledge is of extreme importance to any organisation, as organizations are increas...
Information security is of utmost concern in a multiuser environment. The importance of security is ...
Security and integrity are frequently competing characteristics in an information system. Sectirity ...
Data bases are one of the most important components in every large informatics system which stores a...
Data bases are one of the most important components in every large informatics system which stores a...
The main feature of a secure information system is protecting sensitive data and services of an orga...
Knowledge management can exploit the new opportunities offered by computer networks and pursue its g...
The objective of the paper was to reveal the main techniques and means of ensuring the integrity of ...
Abstract Confidentiality, Integrity and Availability are referred to as the basic principles of Info...
Information has become a very important asset in most organizations today. For this reason, it is im...
AbstractTo reduce the risk of loss and destruction of information stored in a database, the manageme...
Information integrity is a vital security property in a variety of applications. However, there is m...
Abstract. Information integrity policies are traditionally enforced by access control mechanisms tha...
Exfiltration of sensitive data and intellectual property theft have increased to a significant level...
The article outlines the concept of maintaining the required security level of the information syste...
The security of knowledge is of extreme importance to any organisation, as organizations are increas...
Information security is of utmost concern in a multiuser environment. The importance of security is ...