A 5 5 page essay exploring the HRU model in information security. Definitions are included and the model is assessed. 5 sources are listed.
Name of Research Paper File: RT13_SA208HRU.rtf
Unformatted Sample Text from the Research Paper:
crisis facing the world. The author points out that most education focuses on short-range or medium-range goals, but that should not limit long term planning (2002). Technologies will always change
and systems will become obsolete and of course, the basic infrastructure will evolve in ways that no one has imagined (2002). Yet, while it is the case that things are
constantly changing in the computer science realm, it is important to note that security is of the utmost importance as is the retention of data. The integrity and longevity of
data is vital to any business or research environment. In looking at this topic, HRU becomes important. Despite its limitations, it is a model that is used and should be
evaluated in the realm of information security. The Harrison-Ruzzo-Ullman (HRU) model of information security, and access matrix model, may be used for analysis. In fact, HRU is a rather
good tool to use for analysis and seems to be up to the task, although there are some who prefer other models due to HRUs inherent limitations. In fact, many
questions arise in respect to the Harrison-Ruzzo-Ullman model. For instance, how does it define and interpret information security and how does it capture the concept of a user accessing a
resource? Finally, how does the model allow for the expression of network based security requirements? First, it is important to note that HRU has serious limitations that
may interfere with its utilization. Still, it has some good points. For example, the access matrix model which was formalized by Harrison, Ruzzo, and Ullman (HRU) has great expressive power
("The typed," 1992). At the same time, the truth is that HRU has weak safety properties (1992). For example, the determination as to whether or not a given subject