1976
DOI: 10.21236/ada023588
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computer System: Unified Exposition and Multics Interpretation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
837
0
24

Year Published

1995
1995
2012
2012

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 1,408 publications
(890 citation statements)
references
References 6 publications
1
837
0
24
Order By: Relevance
“…We give the following definitions referring to the literature [1], [3], [4], [9], [10]. Definition 1: S denotes the set of subjects.…”
Section: Model Elementsmentioning
confidence: 99%
See 1 more Smart Citation
“…We give the following definitions referring to the literature [1], [3], [4], [9], [10]. Definition 1: S denotes the set of subjects.…”
Section: Model Elementsmentioning
confidence: 99%
“…Table 1 shows the requirements of BLP model and Biba model on the sensitivity label function. Partly referring the description of [1], [3], [4], [9], [10], we give the decisions of access authorization and dynamic adjustment rules of sensitive labels. In "Read rule", if the sensitivity labels of subjects and objects meet the requirements of BLP and Biba model simultaneously, the direct authorization to operations and adjustment of the access historical labels will be performed.…”
Section: Definitionmentioning
confidence: 99%
“…If we specify such a. requirement for all user representatives and for all operations we will obtain the requirements of the multi-level security policy of the Bell La.Padula. model [BL75].…”
Section: Security Requirementsmentioning
confidence: 99%
“…The formulas of the logic offer a powerful formalism to specify access control policies, as well as, information fl.ow policies. Using the logic we can specify well known security policies in a uniform manner, for instance, the multi-level security policy [BL75], or the Chinese Wall policy [BN89], as well as, application specific security policies. The model used in our approach may be characterized as information flow model with special support for data integrity based on a computation model supporting concurrency.…”
Section: Introductionmentioning
confidence: 99%
“…⊥ represents the no-access permission and represents full-access permission. In general, an entity with permission p ∈ PERM implicitly has permission p ≤ p, where ≤ is the partial order relation on the semiring S. Encoding permissions using a partial order is common, for example, [Bell and Padula, 1976] is based on a partial order of security classes, Java Security permissions are partially ordered [Gong, 1999] and [Bharadwaj and Baras, 2003] codifies Role and Permission lattices within a semiring.…”
Section: Access Configurationmentioning
confidence: 99%