Encyclopedia of Software Engineering 2002
DOI: 10.1002/0471028959.sof297
|View full text |Cite
|
Sign up to set email alerts
|

Security Models

Abstract: The term security model has been used to describe any formal statement of a system's confidentiality, availability, or integrity requirements. In this article we focus on the primary use of security models, which has been to describe general confidentiality requirements. We then give pointers to security model work in other areas. Even if we limit ourselves to models of confidentiality, there are two related, but distinct, senses of the term … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2002
2002
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(49 citation statements)
references
References 31 publications
0
49
0
Order By: Relevance
“…A consensus has been reached by considering a policy a set of rules and conditions that state which actions are permitted and which actions are prohibited, whereas a model as a formal description of a security policy: it precisely and unambiguously conveys those aspects of the security policy that are enforced by the system [McL94].…”
Section: Security Policies and Modelsmentioning
confidence: 99%
“…A consensus has been reached by considering a policy a set of rules and conditions that state which actions are permitted and which actions are prohibited, whereas a model as a formal description of a security policy: it precisely and unambiguously conveys those aspects of the security policy that are enforced by the system [McL94].…”
Section: Security Policies and Modelsmentioning
confidence: 99%
“…This approach, however, exposes the systems to denials-of-service attacks whereby low level processes can impede high level (and therefore, presumably, more important) processes to complete their activity. Covert channels are difficult to control also because of the difficulty of mapping an access control model's primitive to a computer system [64]. For this reason, covert channels analysis is usually carried out in the implementation phase, to make sure that the implementation of the model's primitive is not too weak.…”
Section: Limitations Of Mandatory Policiesmentioning
confidence: 99%
“…Beside the complexity, the limitation of such solutions is that covert channels are found out at the end of the development process, where system changes are much more expensive to correct. Interface models have been proposed which attempt to rule out covert channels analysis in the modeling phase [64,37]. Rather than specifying a particular method to enforce security, interface models specify restrictions on a system's input/output that must be obeyed to avoid covert channels.…”
Section: Limitations Of Mandatory Policiesmentioning
confidence: 99%
“…Intuitively, to establish that information does not flow from high to low it is sufficient to establish that high behavior has no effect on what low level users can observe, i.e., the low level view of the system is independent of high behavior. Noninterference has been further developed in different settings such as programming languages [38,36,35,3], trace models [20,21], process calculi [30,28,33,8,6,14], probabilistic models [2,7], timed models [13], cryptographic protocols [1,9,4].…”
Section: Introductionmentioning
confidence: 99%