Security models and information flow
- 1 January 1990
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 180-187
- https://doi.org/10.1109/risp.1990.63849
Abstract
A theory of information flow is developed that differs from that of nondeducibility, which is seen to be a theory of information sharing. The theory is used to develop a flow-based security model (FM) and to show that the proper treatment of security-relevant causal factors in such a framework is very tricky. Using FM as a standard for comparison, an examination is made of interference, generalized noninterference, and extensions to noninterference designed to protect high-level output, and it is seen that the proper treatment of causal factors in such models requires programs to be considered as explicit input to systems. This gives a new perspective on security levels. The model of D.E. Bell and L.J. LaPadula (1973), on the other hand, more successfully models security-relevant causal information, although this success is bought at the expense of the model being vague about its primitives. This vagueness is examined with respect to the claim that the Bell-LaPadula model and noninterference are equivalent.Keywords
This publication has 11 references indexed in Scilit:
- Noninterference and unwinding for LOCKPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The specification and modeling of computer securityComputer, 1990
- The algebra of securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988
- Specifications for Multi-Level Security and a Hook-UpPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Reasoning About Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- A Theory of Communicating Sequential ProcessesJournal of the ACM, 1984
- A Formal Method for the Abstract Specification of SoftwareJournal of the ACM, 1984
- Comparison Paper between the Bell and LaPadula ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976