The Bell-LaPadula Computer Security Model Represented as a Special Case of the Harrison-Ruzzo-Ullman Model

نویسنده

  • Paul A. Pittelli
چکیده

Specifically, suppose we have a BLP model which consists Currently most computer security models are classified among the tl:l~ types; access control, information flow, and non-interference. Within the realm of access control lies the classical Bell-LaPadula model. A BLP model consists of a set of subjects and objects, thr~e security level functions, and a discretionary access matrix together with a set of rules used to manipulate the current state of the model. Security in this model is dependent upon the satisfaction of the three properties: simple security, discretionary access, and the * property. An HRU model consists of an access matrix and a finite set of commands which act as matrix transformations. Here security is determined by looking for the existence of an access right in a specific cell of the matrix. We define a specific HRU model (called the Bobo model) and establish a correspondence between the Bobo commands and BLP rules, also between the Bobo and BLP states. Furthermore we observe that this correspondence is security preserving in the fact that a BLP access triple is secure if and only if that access is contained in a specific cell of the Bobo access matrix.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Expressive Power of the Schematic Protection Model

In this paper we show that the Schematic Protection Model (SPM) subsumes several well-known protection models as particular instances. We show this for a diverse collection of models including the Bell-LaPadula multi-level security model, take-grant models, and grammatical protection systems. Remarkably SPM subsumes these models within its known e ciently decidable cases for safety analysis (i....

متن کامل

Lattice-based enforcement of Chinese Walls

The Chinese Wall policy was identi ed and so named by Brewer and Nash [2]. This policy arises in the nancial segment of the commercial sector, which provides consulting services to other companies. Consultants naturally have to deal with con dential company information for their clients. The objective of the Chinese Wall policy is to prevent information ows which cause con ict of interest for i...

متن کامل

Lattice - Based Enforcement of Chinese

The Chinese Wall policy was identiied and so named by Brewer and Nash 2]. This policy arises in the nancial segment of the commercial sector, which provides consulting services to other companies. Consultants naturally have to deal with conndential company information for their clients. The objective of the Chinese Wall policy is to prevent information ows which cause connict of interest for in...

متن کامل

About Security Models

A method for evaluating security models is developed and applied to the model of Bell and LaPadula. The method shows the inadequacy of the Bell and LaPadula model, in particular,and the impossibilityof any adequate definitionof a secure system based solely on the notion of a secure state. The implications for the fruitfulnessof seeking a global definition of a secure system and for the state of...

متن کامل

A Lattice Interpretation of the Chinese Wall Policy

The Chinese Wall policy was identi ed and so named by Brewer and Nash [2]. This policy arises in the segment of the commercial sector which provides consulting services to other companies. Consultants naturally have to deal with con dential company information for their clients. The objective of the Chinese Wall policy is to prevent information ows which cause con ict of interest for individual...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016