This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Enriching the Expressive Power of Security Labels
October 1995 (vol. 7 no. 5)
pp. 839-841

Abstract—Common security models such as Bell-LaPadula focus on the control of access to sensitive data but leave some important systems issues unspecified, such as the implementation of read-only objects, garbage collection, and object upgrade and downgrade paths. Consequently, different implementations of the same security model may have conflicting operational and security semantics. We propose the use of more expressive security labels for specifying these system issues within the security model, so that the semantics of a system design are precisely understood and are independent of implementation details.

[1] S.G. Akl and D.E. Denning,“Checking classification constraints for consistency and completeness,” Proc. IEEE Symp. Security and Privacy, pp. 196-201,Oakland, Calif., Apr. 1987.
[2] D.E. Bell and L.J. La Padula,“Secure computer system: Unified exposition and multics interpretation,” Tech. Report No. ESD-TR-75-306, MITRE Corp., Bedford, Mass., Mar. 1976.
[3] E. Bertino,L.V. Mancini,, and S. Jajodia,“Collecting garbage in multilevel secure object stores,” Proc IEEE Symp. Research in Security and Privacy, pp. 106-120,Oakland, Calif., May 1994.
[4] D.F.C. Brewer and M.J. Nash, "The chinese wall security policy," Proc. IEEE Symp. Security and Privacy,Oakland, Calif., pp. 206-214, Apr. 1989.
[5] B.A. Davey and H.A. Priestley,Introduction to Lattices and Order, Cambridge Univ. Press, 1990.
[6] D. Denning,"A lattice model of secure information flow," Comm. ACM, vol. 19, no. 5, pp. 236-243, 1976.
[7] S.N. Foley,“Secure information flow using security groups,” Proc. Third IEEE Computer Security Foundations Workshop, pp. 62-72,Franconia, N.H., June 1990.
[8] C.E. Landwehr, "Formal models for computer security," ACM Computing Survey, vol. 13, no. 3, pp. 247-278, Sept. 1981.

Index Terms:
Data security, garbage collection, multilevel security, object label, read-only object.
Citation:
Li Gong, Xiaolei Qian, "Enriching the Expressive Power of Security Labels," IEEE Transactions on Knowledge and Data Engineering, vol. 7, no. 5, pp. 839-841, Oct. 1995, doi:10.1109/69.469837
Usage of this product signifies your acceptance of the Terms of Use.