The specification and modeling of computer security
- 1 January 1990
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Computer
- Vol. 23 (1) , 9-16
- https://doi.org/10.1109/2.48795
Abstract
A description is given of computer security models in general and the model of D. Bell and L. LaPadula (Tech. Rep. MTR-2997, Mitre Corp., 1976) in particular. The Bell and LaPadula (BLP) model is the backbone of the National Computer Security Center's evaluation process for trusted computer systems. Although discretionary access control is briefly addressed, the focus is on mandatory access control (MAC) in national security. However, the issues addressed are relevant to any setting in which MAC-like restrictions arise. It is shown that security is a fruitful research area for those interested in software specification, since some of the most difficult issues in specifying security have analogs in other domains. The limitations of the BLP model are examined. For example, it has little relevance for systems in which users can change their own security levels or those of their files, and it is inadequate for expressing requirements that certain operations cannot be performed by a single individual working alone. It is shown how BLP's limitations can be remedied by a framework of models, making it more useful to those interested in industrial security.Keywords
This publication has 10 references indexed in Scilit:
- Noninterference and the composability of security propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The algebra of securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988
- Reasoning About Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- A comment on the ‘basic security theorem’ of Bell and LaPadulaInformation Processing Letters, 1985
- A security model for military message systemsACM Transactions on Computer Systems, 1984
- A Formal Method for the Abstract Specification of SoftwareJournal of the ACM, 1984
- Abstract requirements specification: A new approach and its applicationIEEE Transactions on Software Engineering, 1983
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976