1977
DOI: 10.1145/1067625.806547
|View full text |Cite
|
Sign up to set email alerts
|

Proving multilevel security of a system design

Abstract: Two nearly equivalent models of multilevel security are presented.The use of multiple models permits the utilization of each model for purposes where that model is particularly advantageous.In this case, the more general model is simple and easily comprehensible, being more abstract, and is useful for exposition of the meaning of multilevel security. The less general model relates well to design specifications and permits straightforward proof of the security of a system design. The correspondence between the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

1980
1980
2006
2006

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(16 citation statements)
references
References 4 publications
0
16
0
Order By: Relevance
“…The key innovation in the AURA project is the pervasive use of policy-justified data, a technique that simultaneously generalizes both traditional multi-level security (MLS) labels [16,20,22,46] and capability-based trust-management mechanisms [12,31]. Like MLS, policy-justified data associates security-policy-specific metadata with each data value in the system and propagates them together to account for information flows.…”
Section: The Missing Piece: Mechanized Metatheory For Security-orientmentioning
confidence: 99%
“…The key innovation in the AURA project is the pervasive use of policy-justified data, a technique that simultaneously generalizes both traditional multi-level security (MLS) labels [16,20,22,46] and capability-based trust-management mechanisms [12,31]. Like MLS, policy-justified data associates security-policy-specific metadata with each data value in the system and propagates them together to account for information flows.…”
Section: The Missing Piece: Mechanized Metatheory For Security-orientmentioning
confidence: 99%
“…7 Both the item and what is displayed must be specified so that, for example, cases in which two entities have identical values but different security levels can be distinguished. 8 We extend the set theoretic notions of membership and intersection to apply to tuples in the obvious sense. 9 The condition that LO is a function reflects an assumption that a user cannot be on two terminals at the same time.…”
Section: System Statementioning
confidence: 99%
“…In recent years, the Bell and LaPadula model [4,8], has dominated efforts to build secure systems. The publication of this model advanced the technology of computer security by providing a mathematical basis for examining the security provided by a given system.…”
Section: Introductionmentioning
confidence: 99%
“…(Leaks over covert channels are not handled.) This security model designed by Bell and LaPadula is the main model used to build secure military and government systems [3,13].…”
Section: The Bell and Lapadula Modelmentioning
confidence: 99%
“…Military systems [13] employ a multilevel security policy in which security classes consist of pairs of the form (A, C) where A is an authority level and C is a category.…”
Section: The Bell and Lapadula Modelmentioning
confidence: 99%