Multilevel Security: Reprise
نویسنده
چکیده
today? If there is still a need, how might we address it? To define multilevel security, we must first define security, which is “the combination of confidentiality (the prevention of the unauthorized disclosure of information), integrity (the prevention of the unauthorized amendment or deletion of information), and availability (the prevention of the unauthorized withholding of information).” More generally, security is freedom from risk. An information system’s intrinsic value is dwarfed by that which it supports: an organization’s mission. Security, then, is the freedom from risk to a mission. “Multilevel” refers to data classes that are treated differently depending on which users access them. The word “level” implies a class hierarchy, such as top secret, secret, confidential, and unclassified. More commonly, however, it refers to the general concept of access-class differences, which don’t require a strict hierarchy. Multilevel security is the prevention of unauthorized disclosure among multiple information classes. The threat source for the disclosures includes unauthorized users and subverted software operating on behalf of authorized users. The terminology might be more explicit if we could call this concept multidomain confidentiality, but it is worth resisting multiplying terminology. Nonetheless, we should understand that multilevel security means multidomain confidentiality. It’s important to understand what multilevel security is not. It is not complete because it doesn’t address integrity and availability. What’s more, it does not imply anything about the assurance level—referring only to a system’s functional ability to distinguish among data classes, user classes, and access rules between the user and data classes.
منابع مشابه
CAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملShort-Term Effects of Traditional and Alternative Community Interventions to Address Food Insecurity
BACKGROUND Despite the effects of food insecurity on health are well documented, clear governmental policies to face food insecurity do not exist in western countries. In Canada, interventions to face food insecurity are developed at the community level and can be categorized into two basic strategies: those providing an immediate response to the need for food, defined "traditional" and those t...
متن کاملAn Enduring Symposium for Leading Research in Security and Privacy
F or 35 years, the IEEE Symposium on Security and Privacy has provided a venue for leading researchers in security and privacy to gather. It continues to be the premier forum for presenting developments in computer security and electronic privacy and for bringing together researchers and practitioners. Th e topics covered at the symposium have varied over the years, yet the work presented has a...
متن کاملMultilevel Adaptive Security System
MULTILEVEL ADAPTIVE SECURITY SYSTEM by Hongwei Li Recent trends show increased demand for content-rich media such as images, videos and text in ad-hoc communication. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such information over resource constrained ad hoc networks. In this work, traditional data security mechanisms, existing ...
متن کاملSecurity issues for federated database systems
This paper describes security issues for federated database management systems set up for managing distributed, heterogeneous and autonomous multilevel databases. It builds on our previous work in multilevel secure distributed database management systems and on the results of others’ work in federated database systems. In particular, we define a multilevel secure federated database system and d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Security & Privacy
دوره 2 شماره
صفحات -
تاریخ انتشار 2004