scispace - formally typeset
Search or ask a question
Topic

Bell–LaPadula model

About: Bell–LaPadula model is a research topic. Over the lifetime, 35 publications have been published within this topic receiving 3111 citations.

Papers
More filters
ReportDOI
01 Mar 1976
TL;DR: A suggestive interpretation of the model in the context of Multics and a discussion of several other important topics (such as communications paths, sabotage and integrity) conclude the report.
Abstract: : A unified narrative exposition of the ESD/MITRE computer security model is presented. A suggestive interpretation of the model in the context of Multics and a discussion of several other important topics (such as communications paths, sabotage and integrity) conclude the report. A full, formal presentation of the model is included in the Appendix.

2,093 citations

Proceedings ArticleDOI
20 May 2007
TL;DR: A new model for adaptive, risk-based access control is presented, more like a fuzzy logic control system than a traditional access control system and hence the name "fuzzy MLS".
Abstract: This paper presents a new model for, or rather a new way of thinking about adaptive, risk-based access control. Our basic premise is that there is always inherent uncertainty and risk in access control decisions that is best addressed in an explicit way. We illustrate this concept by showing how the rationale of the well-known, Bell-Lapadula model based, multi-level security (MLS) access control model could be used to develop a risk-adaptive access control model. This new model is more like a fuzzy logic control system than a traditional access control system and hence the name "fuzzy MLS". The long version of this paper is published as an IBM Research Report.

317 citations

Proceedings ArticleDOI
07 May 1990
TL;DR: A theory of information flow is developed that differs from that of nondeducibility, which is used to develop a flow-based security model (FM) and it is seen that the proper treatment of causal factors in such models requires programs to be considered as explicit input to systems.
Abstract: A theory of information flow is developed that differs from that of nondeducibility, which is seen to be a theory of information sharing. The theory is used to develop a flow-based security model (FM) and to show that the proper treatment of security-relevant causal factors in such a framework is very tricky. Using FM as a standard for comparison, an examination is made of interference, generalized noninterference, and extensions to noninterference designed to protect high-level output, and it is seen that the proper treatment of causal factors in such models requires programs to be considered as explicit input to systems. This gives a new perspective on security levels. The model of D.E. Bell and L.J. LaPadula (1973), on the other hand, more successfully models security-relevant causal information, although this success is bought at the expense of the model being vague about its primitives. This vagueness is examined with respect to the claim that the Bell-LaPadula model and noninterference are equivalent. >

311 citations

Journal ArticleDOI
TL;DR: This paper shows how the mandatory access control (MAC) model can be extended to incorporate the notion of location and how this location information can be used to determine whether a subject has access to a given object.

81 citations

Proceedings ArticleDOI
04 May 1997
TL;DR: A new approach to secure system design is described in which the various representations of the architecture of a software system are described formally and the desired security properties of the system are proven to hold at the architectural level.
Abstract: The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which the various representations of the architecture of a software system are described formally and the desired security properties of the system are proven to hold at the architectural level. The main ideas are illustrated by means of the X/Open distributed transaction processing reference architecture, which is formalized and extended for secure access control as defined by the Bell-LaPadula model. The extension allows vendors to develop individual components independently and with minimal concern about security. Two important observations were gleaned on the implications of incorporating security into software architectures.

60 citations

Network Information
Related Topics (5)
Cloud computing security
27.1K papers, 511.8K citations
82% related
Authentication
74.7K papers, 867.1K citations
80% related
Server
79.5K papers, 1.4M citations
80% related
Information privacy
25.4K papers, 579.6K citations
79% related
Quality of service
77.1K papers, 996.6K citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20214
20182
20171
20153
20141
20132