Abstract
This paper presents the different kinds of data protections that can be achieved by IT-technology in data communications and in the storage of data. Data integrity, data confidentiality, data origin authentication and a set of non-repudiation services are examined in detail on what is actually achieved depending on how and where the protections are made. These can be performed either on the data object itself or by the communications or storage systems. It is shown that certain types of protections, such as the non-repudiation services, depend on where they are made, whereas others are independent thereof.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
ISO/IEC 7492–2 “Information Technology — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture” (1989).
ECMA TR/46 “Security in Open Systems — A security framework” (1988).
P. Kaijser, “Security protection for parts of a data structure” Comput. Commun., Vol 17 No 7 (July 1994) 476.
ISO/IEC 10181–3 “Information Technology — Open Systems Interconnection — Security Frameworks in Open Systems — Part 3: Access Control” (in preparation).
ISO/IEC 10181–5 “Information Technology — Open Systems Interconnection — Security Frameworks in Open Systems — Part 5: Confidentiality” (in preparation).
ISO/IEC 10181–6 “Information Technology — Open Systems Interconnection — Security Frameworks in Open Systems — Part 6: Integrity” (in preparation).
ISO 8613 “Information Processing — Text and Office Systems — Open Document Architecture (ODA) and interchange format”, (also published as the ITU (CCITT) T.400 Series of Recommendations) (1989).
ISO/IEC 10181–4 “Information Technology — Open Systems Interconnection — Security Frameworks in Open Systems — Part 4: Non-repudiation” (in preparation).
CCITT (ITU) X.400 Series of Recommendations “Message Handling System”, (also published as ISO/IEC 10021, Message-Oriented Text Interchange Systems (MOTIS)) (1988).
ISO 9160 “Information Processing — Data Encipherment — Physical Layer Interoperability Requirement” (1988).
ISO/IEC 11577 “Information Technology — Telecommunications and Information Exchange between Systems — Network Layer Security Protocol” (1994).
ISO/IEC 10736 “Information Technology — Telecommunications and Information Exchange between Systems — Transport Layer Security Protocol” (1994).
T.A. Parker, “A Secure European System for Applications in a Multivendor Environment (The SESAME project)”, Proc. 14th Am. Nat. Security Conf., Washington, DC (1991).
P. Kaijser, T. Parker, and D. Pinkas, “SESAME: The solution to security for open distributed systems”, Comput. Commun., Vol 17 No 7 (July 1994) 501.
J.G. Steiner, C. Neuman, and J.I. Schiller, “Kerberos: an authentication service for open network systems” USENIX Winter Conf., Dallas, TX (1988) 191.
ECMA-138 “Security in Open Systems — Data Elements and Service Definitions” (1989).
ECMA-206 “Security in Open Systems — Association Context Management — including security context management” (1993).
ECMA-219 “Security in Open Systems — Authentication and Privilege Attribute Security Application with related Key Distribution Functions” (1994).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Kaijser, P. (1995). Data Protection in Communications and Storage. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_26
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_26
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive