Issue No. 11 - November (1993 vol. 26)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/2.241422
<p>Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information. In the late 1970s and early 1980s, researchers applied these models to certain integrity concerns. Later, application of the models to the Chinese Wall policy, a confidentiality policy unique to the commercial sector, was demonstrated. A balanced perspective on lattice-based access control models is provided. Information flow policies, the military lattice, access control models, the Bell-LaPadula model, the Biba model and duality, and the Chinese Wall lattice are reviewed. The limitations of the models are identified.</p>
R. S. Sandhu, "Lattice-Based Access Control Models," in Computer, vol. 26, no. , pp. 9-19, 1993.