ABSTRACT

Security computing requirements include confi dentiality, integrity, and availability (FIPS 199, 2004). Confi dentiality is the control of information so that it is only shared among users with

appropriate access. Integrity is ensuring the information is accurate and has not been altered or manipulated in some way. Finally, availability means making sure that users have access where, when, and how needed.