Introduction to knowledge base systems
Introduction to knowledge base systems
Inference secure multilevel databases
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Logic and Databases: A Deductive Approach
ACM Computing Surveys (CSUR)
A lattice model of secure information flow
Communications of the ACM
A formal system for information retrieval from files
Communications of the ACM
Canonical structure in attribute based file organization
Communications of the ACM
An Introduction to Database Systems
An Introduction to Database Systems
Data Models
Discrete Mathematics in Computer Science
Discrete Mathematics in Computer Science
Attribute Based Data Model and Polyinstantiation
Proceedings of the IFIP 12th World Computer Congress on Education and Society - Information Processing '92 - Volume 2 - Volume 2
Theory of Relational Databases
Theory of Relational Databases
A theorem on grid access control
Journal of Computer Science and Technology - Grid computing
Access control in semantic grid
Future Generation Computer Systems - Special issue: Semantic grid and knowledge grid: the next-generation web
Hi-index | 0.00 |
Ideally secure systems must, be provable secure, so they are alldefined by mathematical models. Most of current systems are basedon the Bell and LaPadula Model (BLM), however, many usages are notlogically sound. In this paper, a new paradigm is proposed toreinterpret the BLM. BLM is treated as axioms to define themultilevel security, in the same spirit as Hilbert axioms to theEuc1idean geometry. Absolutely no violations are tolerated. So manyusual trusted subjects are no longer admissible in this new BLM.Three layer architecture is proposed to accommodate suchrequirements.