Abstract
During the last fifty years Information and Communication Technology (ICT) has contributed to almost all sectors of organized societies. As a result, information security is fundamental for several social and business processes that rely on ICT. One dimension of information security concerns availability of information and computational resources. It is essential for a system’s correct operation and its acceptance from end-users to respond with proper reaction times to authorized requests. But whereas other security parameters have been studied and analysed very well, availability has not. Throughout this paper this fundamental parameter of ICT security is under study through a qualitative perspective. We aim at providing the basis for a consequent formalistic foundation of information availability. Approaches like these may be useful for the conceptual description of the problem domain, whilst this conceptualisation may also help in the realization of the guidelines, which are essential for the development of secure information systems.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
References
BrSc95 Brinkley, D. Schell, R. “Concepts and Terminology for Computer Security”. M. Abrams, S. Jajodia, H. Podell (Eds.), Information Security: An integrated collection of essays,IEEE Computer Society Press, 1995.
GRIT94 Gritzalis, D. Information Systems Security in Dependable Environments,Ph.D. Dissertation, University of the Aegean, 1994.
HOSM96 Hosmer, H. “Availability policies in an adversarial environment”. In Proc. of the New Security Paradigms Workshop,pp. 105–117, USA, 1996.
ITSEC91 Information Technology Security Evaluation Criteria (ITSEC), Commission of the European Communities, Brussels, June 1991.
KeU194 Keus, K. and Ullman, M. “Availability: Theory and fundamentals for practical evaluation and use”. In Proc. of the 10` h Annual Computer Security Applications Conference,pp. 258–264, USA 1994.
KOKO96 Kokolakis, S. “Is there a need for new information security models?” In P. Horster (Ed.), Communications and Multimedia Security II. Chapman & Hall, 1996.
LeZh97 Leiwo, J. and Zheng, Y. Layered Protection of Availability,Pacific-Asia conference on information systems (PACIS ‘87), Australia, April 1997.
LYU96 Lyu, M. (Ed.), Handbook of software reliability engineering. McGraw-Hill, 1996.
PaPo98 Papp, G., Posch, R. (Eds.), Global IT Security: Proceedings of the IFIP TC11 14 6 International Conference on Information Security. Chapman & Hall, 1995.
PARK95, Parker D.B. “A new framework for information security to avoid information anarchy”. In J. Ellof, S. von Solms (Eds.), Information Security - the Next Decade. Chapman & Hall, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Tryfonas, T., Gritzalis, D., Kokolakis, S. (2000). A Qualitative Approach to Information Availability. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive