Computer security models are specifications designed, among other things, to limit the damage caused by Trojan Horse programs such as computer viruses. Recent work in such models has revealed limitations of the widely accepted model of Bell and LaPadula. This paper provides an introduction to computer security modeling in general, the Bell and LaPadula model in particular, and the limitations of the model. Many of the issues raised are of interest not simply to the security community, but for the software specification community as a whole. We then construct a framework for security models that address these limitations. The result is a model that not only better addresses government security policies, but nongovernment security policies as...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and P...
peer reviewedSound methodologies for constructing security-critical systems are extremely important ...
The exact description is given of Bell and La Padula security model with use of modern notation. The...
A method for evaluating security models is developed and applied to the model of Bell and LaPadula. ...
method for evaluating security models is developed and applied to the model of Bell and LaPadula. Th...
A distinctive concern in the U.S. military for computer security dates from the emergence of time-sh...
Designing security for a computer system is best done by utilizing a systematic engineering approach...
We present a model-based approach using two dimensions to propagate security restrictions: along the...
This paper describes a taxonomy that reflects concepts within the area of security which was develop...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...
Computer security is an important issue in determining the dependability of computer systems. It bec...
E-government is becoming more important these days. However, the adoption of e-government is often s...
Almost half of UK firms claim to have been subject to some sort of cyber-attack or breach in the las...
A good way to obtain secure systems is to build applications in a systematic way where security is a...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and P...
peer reviewedSound methodologies for constructing security-critical systems are extremely important ...
The exact description is given of Bell and La Padula security model with use of modern notation. The...
A method for evaluating security models is developed and applied to the model of Bell and LaPadula. ...
method for evaluating security models is developed and applied to the model of Bell and LaPadula. Th...
A distinctive concern in the U.S. military for computer security dates from the emergence of time-sh...
Designing security for a computer system is best done by utilizing a systematic engineering approach...
We present a model-based approach using two dimensions to propagate security restrictions: along the...
This paper describes a taxonomy that reflects concepts within the area of security which was develop...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...
Computer security is an important issue in determining the dependability of computer systems. It bec...
E-government is becoming more important these days. However, the adoption of e-government is often s...
Almost half of UK firms claim to have been subject to some sort of cyber-attack or breach in the las...
A good way to obtain secure systems is to build applications in a systematic way where security is a...
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really ...
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and P...
peer reviewedSound methodologies for constructing security-critical systems are extremely important ...