1994
DOI: 10.1016/0167-4048(94)90023-x
|View full text |Cite
|
Sign up to set email alerts
|

On the validity of the Bell-La Padula model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

1996
1996
2012
2012

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In lattice-based access control policies that based on BLPM two fundamental precepts can be found. Firstly, it is not allowed to read up (Lindgreen & Herschberg, 1994). This means a subject cannot read information that is of a higher security category than the subject's clearance.…”
Section: Multilevel Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In lattice-based access control policies that based on BLPM two fundamental precepts can be found. Firstly, it is not allowed to read up (Lindgreen & Herschberg, 1994). This means a subject cannot read information that is of a higher security category than the subject's clearance.…”
Section: Multilevel Securitymentioning
confidence: 99%
“…This cannot be realized with a MLS approach that is based on BLPM where the classification of the object equals the highest security category and the union of all needs-to-know categories of the information stored in this object. The granularity of an object is not defined in BLPM (Lindgreen & Herschberg, 1994). In literature, examples can be found that identifies an object with a segment that may be a file or a multiple variable (Bell & LaPadula, 1976, Saltzer & Schroeder, 1975.…”
Section: Multilevel Securitymentioning
confidence: 99%
“…McLean [342,343] reconsiders the Basic Security Theorem of that study. Lindgreen/Herschberg [322] present a critical view of the achievements of the study. Sandhu [428] gives a concise summary of the many variants and applications that evolved.…”
Section: Bibliographic Hintsmentioning
confidence: 99%
“…11,19,181,194,195,321,322,327,355, 561, 591 control and monitoring 173, 181, 194, 199, 203, 240, 327, 348, 355, This view offers the possibility to employ the well-understood theory of systems of linear equations.…”
Section: A5 Finite Algebrasmentioning
confidence: 99%
“…Further, a subject of higher security level could not write information within a text written by a subject of lower security level. It could be clearly seen that a workflow between those two subjects is not supported by existing MLS operation systems [9,10,11].…”
Section: Introductionmentioning
confidence: 99%