• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Lattice-Based Access Control Models (1993)

Cached

  • Download as a PDF

Download Links

  • [www.list.gmu.edu]
  • [www.list.gmu.edu]
  • [csrc.nist.gov]
  • [www.cs.wpi.edu]
  • [www.cs.toronto.edu]
  • [csrc.nist.gov]
  • [www.cs.toronto.edu]
  • [www.list.gmu.edu]
  • [www.list.gmu.edu]
  • [csrc.nist.gov]
  • [people.eecs.ku.edu]
  • [people.eecs.ku.edu]
  • [people.eecs.ku.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Ravi S. Sandhu
Citations:1517 - 61 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Sandhu93lattice-basedaccess,
    author = {Ravi S. Sandhu},
    title = {Lattice-Based Access Control Models},
    year = {1993}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

The objective of this article is to give a tutorial on lattice-based access control models for computer security. The paper begins with a review of Denning's axioms for information flow policies, which provide a theoretical foundation for these models. The structure of security labels in the military and government sectors, and the resulting lattice is discussed. This is followed by a review of the Bell-LaPadula model, which enforces information flow policies by means of its simple-security and *-properties. It is noted that information flow through covert channels is beyond the scope of such access controls. Variations of the Bell-LaPadula model are considered. The paper next discusses the Biba integrity model, examining its relationship to the Bell-LaPadula model. The paper then reviews the Chinese Wall policy, which arises in a segment of the commercial sector. It is shown how this policy can be enforced in a lattice framework.

Keyphrases

lattice-based access control model    bell-lapadula model    information flow policy    resulting lattice    chinese wall policy    security label    biba integrity model    theoretical foundation    lattice framework    covert channel    commercial sector    information flow    government sector    computer security    access control   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University