Quality of Protection
DOI: 10.1007/978-0-387-36584-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel Security and Quality of Protection

Abstract: Abstract. Constraining how information may flow within a system is at the heart of many protection mechanisms and many security policies have direct interpretations in terms of information flow and multilevel security style controls. However, while conceptually simple, multilevel security controls have been difficult to achieve in practice. In this paper we explore how the traditional assurance measures that are used in the network multilevel security model can be re-interpreted and generalised to provide the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 36 publications
(83 reference statements)
0
13
0
Order By: Relevance
“…The model presented in this paper has a close relationship with the multilevel security model described in [19], whereby the lattice of multilevel security levels correspond to the lattice of attributes, the assurance levels correspond to the Quality c-semiring. Therefore, results on the multilevel cascade problem can be applied to our model.…”
Section: Examplementioning
confidence: 97%
“…The model presented in this paper has a close relationship with the multilevel security model described in [19], whereby the lattice of multilevel security levels correspond to the lattice of attributes, the assurance levels correspond to the Quality c-semiring. Therefore, results on the multilevel cascade problem can be applied to our model.…”
Section: Examplementioning
confidence: 97%
“…The key classification ordering defines the flow constraints between keys, for example, long term key Ka information should not be permitted to flow to session key Kab information. Rather than relying on a binary interpretation of how key related information may/may not flow, we take a qualitative-based approach that is similar to the notion of assurance in [9,7]. Define…”
Section: Protocol Deployment Riskmentioning
confidence: 99%
“…Thus, different customers at data centers will have different perceptions of the best trade-off solution between a high level of security and the related costs. Some research has been done in the area of multilevel security, see for example Foley et al [5] or in the area of IT business outsourcing, e.g. Karabulut [14].…”
Section: Introductionmentioning
confidence: 99%