Abstract
The main goal of this paper is to define storage jamming. We also discuss our work to date on possible defenses against it; in order to make the case that there are solutions.
Chapter PDF
Similar content being viewed by others
References
Boebert, W.E. And Kain, R.Y. (1985) A practical alternative to hierarchical integrity policies, in Proceedings of the 8th National Computer Security Conference (Gaithersburg, Maryland). 18–28.
Clark, D.D. and Wilson, D.R. (1987) A comparison of commercial and military computer security policies, in Proceedings of the IEEE Symposium on Security and Privacy (Oakland, California). 184–194.
Defense Science Board. (1994) Report of the Summer Study Task Force on Information Architecture for the Battlefield, December 20, 1994.
Hinke, T. (1988) DBMS technology vs. threats, in Database Security: Status and Prospects, ed. C. Landwehr, North-Holland, Amsterdam, 57–87.
Katzke, S.W. and Ruthberg, Z.G. (editors). (1989) Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPICS), NIST, Special Publication 500–160.
Ruthberg, Z.G. and Polk, W.T. (editors). (1989) Report of the Invitational Workshop on Data Integrity, NIST, Special Publication 500–168.
Sandhu, R.S. (1988) The schematic protection model: its definition and analysis for acyclic attenuating schemes. JACM 35, 2. 404–432.
Sandhu, R.S. (1989) Terminology, criteria and system architectures for data integrity. In Report of the Invitational Workshop on Data Integrity (Ruthberg, Z.G. and Polk, W.T. editors), NIST, Special Publication 500–168.
Sandhu, R.S. (1991) Separation of duties in computerized information systems. In Database Security IV Status and Prospects (Jajodia, S. and Landwehr. C.E., editors). North-Holland, 179–189.
Sandhu, R.S. and Jajodia, S. (1990) Integrity mechanisms in database management systems, in Proceedings of the 13th NIST-NCSC National Computer Security Conference (Washington, DC). 526–540.
Thomsen, D.J. and Haigh, J.T. (1990) A comparison of type enforcement and Unix setuid implementation of well-formed transactions, in Proceedings of Sixth Annual Computer Security Applications Conference (Tucson, Arizona). 304–312.
Wiseman, S., Terry, P., Wood, A., and Harrold, C. (1988) The trusted path between SMI IE and the user, in Proceedings of the IEEE Symposium on Security and Privacy (Oakland, California). 147–155.
Wiseman, S. (1991) The control of integrity in databases, in Database Security IV: Status and Prospects, (JAJODIA, S. and LANDWEHR. C.E., editors).North-Holland, 191–203.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Mcdermott, J., Goldschlag, D. (1996). Storage Jamming. In: Spooner, D.L., Demurjian, S.A., Dobson, J.E. (eds) Database Security IX. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34932-9_23
Download citation
DOI: https://doi.org/10.1007/978-0-387-34932-9_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2954-1
Online ISBN: 978-0-387-34932-9
eBook Packages: Springer Book Archive