A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification

  • Authors:
  • Simon Foley;Li Gong;Xiaolei Qian

  • Affiliations:
  • -;-;-

  • Venue:
  • SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, including high-water marks, downgrading, separation of duties, and Chinese Walls. The model forms the basis for a tiered approach to the formal development of secure systems, whereby security verification can be spread across what makes up the reference monitor and the security requirement specification. The advantage of this approach is that once a trusted computing base (TCB) is in place, reconfiguring it for different security requirements requires verification of just the new requirements. We illustrate the approach with a number of examples, including one policy that permits high-level subjects to make relabeling requests on low-level objects; the policy is multilevel secure.