“…In lattice-based access control policies that based on BLPM two fundamental precepts can be found. Firstly, it is not allowed to read up (Lindgreen & Herschberg, 1994). This means a subject cannot read information that is of a higher security category than the subject's clearance.…”
Section: Multilevel Securitymentioning
confidence: 99%
“…This cannot be realized with a MLS approach that is based on BLPM where the classification of the object equals the highest security category and the union of all needs-to-know categories of the information stored in this object. The granularity of an object is not defined in BLPM (Lindgreen & Herschberg, 1994). In literature, examples can be found that identifies an object with a segment that may be a file or a multiple variable (Bell & LaPadula, 1976, Saltzer & Schroeder, 1975.…”
“…In lattice-based access control policies that based on BLPM two fundamental precepts can be found. Firstly, it is not allowed to read up (Lindgreen & Herschberg, 1994). This means a subject cannot read information that is of a higher security category than the subject's clearance.…”
Section: Multilevel Securitymentioning
confidence: 99%
“…This cannot be realized with a MLS approach that is based on BLPM where the classification of the object equals the highest security category and the union of all needs-to-know categories of the information stored in this object. The granularity of an object is not defined in BLPM (Lindgreen & Herschberg, 1994). In literature, examples can be found that identifies an object with a segment that may be a file or a multiple variable (Bell & LaPadula, 1976, Saltzer & Schroeder, 1975.…”
“…McLean [342,343] reconsiders the Basic Security Theorem of that study. Lindgreen/Herschberg [322] present a critical view of the achievements of the study. Sandhu [428] gives a concise summary of the many variants and applications that evolved.…”
Section: Bibliographic Hintsmentioning
confidence: 99%
“…11,19,181,194,195,321,322,327,355, 561, 591 control and monitoring 173, 181, 194, 199, 203, 240, 327, 348, 355, This view offers the possibility to employ the well-understood theory of systems of linear equations.…”
“…Further, a subject of higher security level could not write information within a text written by a subject of lower security level. It could be clearly seen that a workflow between those two subjects is not supported by existing MLS operation systems [9,10,11].…”
Data protection and information security can be assured by using a multi-level-security (MLS) access control model. However, a workflow between persons with different security levels is complicated by the fact that the exchange of information is only allowed in one direction: from persons that are assigned to a specific security level to person that are assigned to the same security level or to a higher security level (write up). Literature show solution approaches by using a MLS model with increased granularity. This enables distributing parts of documents to subjects of lower security levels without causing a security compromise. However, it does not consider an important aspect of workflows: the deleting of information. Thus, this work uses electronic engineering enlarges the introduced MLS model with increased granularity by integrating a deleting feature. This enables an improved workflow between persons with different security levels.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.