{"title":"AM/FM-GIS中的完整性和安全性","authors":"E. Orlandi","doi":"10.1109/CCST.1993.386801","DOIUrl":null,"url":null,"abstract":"The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Integrity and security in AM/FM-GIS\",\"authors\":\"E. Orlandi\",\"doi\":\"10.1109/CCST.1993.386801\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<<ETX>>\",\"PeriodicalId\":404786,\"journal\":{\"name\":\"1993 Proceedings of IEEE International Carnahan Conference on Security Technology\",\"volume\":\"120 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1993-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1993 Proceedings of IEEE International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1993.386801\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1993.386801","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<>