1998
DOI: 10.1007/bfb0055854
|View full text |Cite
|
Sign up to set email alerts
|

A kernelized architecture for multilevel secure application policies

Abstract: Mandatory label-based policies may be used to support a wide-range of application security requirements. Labels encode the security state of system entities and the security policy specifies how these labels may change. Building on previous results, this paper develops a model for a kernelized framework for supporting these policies. The framework provides the basis for, what is essentially, an interpreter of multilevel programs: programs that manipulate multilevel label datastructures. This enables applicatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2002
2002
2005
2005

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
(40 reference statements)
0
3
0
Order By: Relevance
“…2 The KeyNote architecture provides a level of separation between the provision of security policy authorisation and application functionality. As a software engineering paradigm, techniques that support separation of concerns for security [6,17], synchronisation [25], and so forth are desirable since they lead to applications that are easier to develop, understand and maintain.…”
Section: Examplementioning
confidence: 99%
“…2 The KeyNote architecture provides a level of separation between the provision of security policy authorisation and application functionality. As a software engineering paradigm, techniques that support separation of concerns for security [6,17], synchronisation [25], and so forth are desirable since they lead to applications that are easier to develop, understand and maintain.…”
Section: Examplementioning
confidence: 99%
“…As a software engineering paradigm, techniques that support separation of concerns for security [2,5], synchronization [10], and so forth are desirable since they lead to applications that are easier to develop, understand and maintain.…”
Section: B-mentioning
confidence: 99%
“…As a software engineering paradigm, techniques that support separation of concerns for security [10], [13], synchronisation [14], and so forth are desirable since they lead to applications that are easier to develop, understand and maintain.…”
Section: Trust Managementmentioning
confidence: 99%