Trusted subjects configuration based on TE model in MLS systems

  • Authors:
  • Shangjie Li;Yeping He

  • Affiliations:
  • National Engineering Research Center for Fundamental Software, Institute of Software, The Chinese Academy of Sciences, Beijing, China;National Engineering Research Center for Fundamental Software, Institute of Software, The Chinese Academy of Sciences, Beijing, China

  • Venue:
  • INTRUST'10 Proceedings of the Second international conference on Trusted Systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trusted subjects are inevitably parts of multi-level security systems or trusted networks. They can introduce security risk into system, as they don't comply with *-property in Bell LaPadula model. It's an important work to determine which subjects are trusted from hundreds and thousands of applications, and what their security requirements are during the developing and deploying secure operating systems. In this paper, an approach is proposed to address these issues based on information flow and risk analysis. Type enforcement specification is used as a base for information flow analysis and then finding out trusted subjects and their security requirements:security label range and security assurance level.