• Research Paper on:
    Information Security and Harrison-Ruzzo-Ullman

    Number of Pages: 5

     

    Summary of the research paper:

    A 5 5 page essay exploring the HRU model in information security. Definitions are included and the model is assessed. 5 sources are listed.

    Name of Research Paper File: RT13_SA208HRU.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    crisis facing the world. The author points out that most education focuses on short-range or medium-range goals, but that should not limit long term planning (2002). Technologies will always change  and systems will become obsolete and of course, the basic infrastructure will evolve in ways that no one has imagined (2002). Yet, while it is the case that things are  constantly changing in the computer science realm, it is important to note that security is of the utmost importance as is the retention of data. The integrity and longevity of  data is vital to any business or research environment. In looking at this topic, HRU becomes important. Despite its limitations, it is a model that is used and should be  evaluated in the realm of information security. The Harrison-Ruzzo-Ullman (HRU) model of information security, and access matrix model, may be used for analysis. In fact, HRU is a rather  good tool to use for analysis and seems to be up to the task, although there are some who prefer other models due to HRUs inherent limitations. In fact, many  questions arise in respect to the Harrison-Ruzzo-Ullman model. For instance, how does it define and interpret information security and how does it capture the concept of a user accessing a  resource? Finally, how does the model allow for the expression of network based security requirements? First, it is important to note that HRU has serious limitations that  may interfere with its utilization. Still, it has some good points. For example, the access matrix model which was formalized by Harrison, Ruzzo, and Ullman (HRU) has great expressive power  ("The typed," 1992). At the same time, the truth is that HRU has weak safety properties (1992). For example, the determination as to whether or not a given subject 

    Back to Research Paper Results