Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Data Integrity

Handbook of Research on Information Security and Assurance
The provision of the property that data and data sequences have not been altered or destroyed in an unauthorized manner.
Published in Chapter:
A Formal Verification Centred Development Process for Security Protocols
Tom Coffey (University of Limerick, Ireland)
Copyright: © 2009 |Pages: 14
DOI: 10.4018/978-1-59904-855-0.ch014
Abstract
This chapter concerns the correct and reliable design of modern security protocols. It discusses the importance of formal verification of security protocols prior to their release by publication or implementation. A discussion on logic-based verification of security protocols and its automation provides the reader with an overview of the current state-of-the-art of formal verification of security protocols. The authors propose a formal verification centred development process for security protocols. This process provides strong confidence in the correctness and reliability of the designed protocols. Thus, the usage of weak security protocols in communication systems is prevented. A case-study on the development of a security protocol demonstrates the advantages of the proposed approach. The case-study concludes with remarks on the performance of automated logic-based verification and presents an overview of formal verification results of a range of modern security protocols.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Challenges in Developing Software in Today's Scenario: An Analysis at Developmental Stage Level
The support and the affirmation of the precision and consistency of information over its whole life cycle, and is a basic viewpoint to the plan, execution and use of any framework which stores, processes, or recovers information.
Full Text Chapter Download: US $37.50 Add to Cart
Fundamental Building Blocks for Security Interoperability in e-Business
Full Text Chapter Download: US $37.50 Add to Cart
Application of the P2P Model for Adaptive Host Protection
The integrity of a computer system means that the host behaves and works as its administrator intended it to do so. Data integrity must therefore be always monitored.
Full Text Chapter Download: US $37.50 Add to Cart
Big Data Governance in Agile and Data-Driven Software Development: A Market Entry Case in the Educational Game Industry
The trustworthiness of the data, including data integration, data lifecycle management, and data quality monitoring.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy in Distance Education
The assurance that data received are exactly as sent by an authorized party. In other words, the data contains no modifications, insertions, deletions or reproductions.
Full Text Chapter Download: US $37.50 Add to Cart
Practical Measures for Securing Government Networks
This is the concept of being able to assure that data or voice transmissions can be maintained in an unimpaired state or condition and is not subject to unauthorized modification, whether that modification is intentional or inadvertent. It protects against modification, insertion, deletion, or replay of data. Data integrity is one of the three goals of a security program.
Full Text Chapter Download: US $37.50 Add to Cart
Network-Based Intrusion Detection
The integrity of a computer system means that the host behaves and works as its administrator intended it to do so. Data integrity must therefore be always monitored.
Full Text Chapter Download: US $37.50 Add to Cart
E-Collaboration Enhanced Host Security
The integrity of a computer system means that the host behaves and works as its administrator intended it to do so. Data integrity must therefore be always monitored.
Full Text Chapter Download: US $37.50 Add to Cart
Analysis and Comparison of Hash Functions in Terms of Security and Performance
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology: Concepts, Components, and Cases
This is the assurance of the data accuracy, and its consistency over its entire life cycle. It also includes ensuring the soundness of the system that collects, stores, processes, transfers, and retrieves data. Blockchain technology, being immutable, can ensure data integrity.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain in Gaming
Today’s era is of big data, but it is equally important to maintain that data safely in reference to any currency data integrity must be managed properly.
Full Text Chapter Download: US $37.50 Add to Cart
Introduction to Quantum-Resistant Blockchain
Is established in blockchain because stored data is immutable and permanent and cannot be changed or erased.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud-Based Dynamic Line Rating: Architecture, Services, and Cyber Security
The process of ensuring the overall accuracy, completeness, and consistency of data, i.e., a guarantee that the information has not been modified in an unauthorized way.
Full Text Chapter Download: US $37.50 Add to Cart
Medical Data Security Tools and Techniques in E-Health Applications
The ability to restrain the data from being altered by unauthorized user.
Full Text Chapter Download: US $37.50 Add to Cart
Data Stewards, Curators, and Experts: Library Data Engagement at Samuel J. Wood Library at Weil Cornell Medicine
The accuracy and consistency of data stored in a database, data warehouse, data mart or other construct. Data with “integrity” is said to have a complete or whole structure.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR