This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Lattice-Based Access Control Models
November 1993 (vol. 26 no. 11)
pp. 9-19

Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information. In the late 1970s and early 1980s, researchers applied these models to certain integrity concerns. Later, application of the models to the Chinese Wall policy, a confidentiality policy unique to the commercial sector, was demonstrated. A balanced perspective on lattice-based access control models is provided. Information flow policies, the military lattice, access control models, the Bell-LaPadula model, the Biba model and duality, and the Chinese Wall lattice are reviewed. The limitations of the models are identified.

Citation:
Ravi S. Sandhu, "Lattice-Based Access Control Models," Computer, vol. 26, no. 11, pp. 9-19, Nov. 1993, doi:10.1109/2.241422
Usage of this product signifies your acceptance of the Terms of Use.