Abstract | ||
---|---|---|
Trusted subjects are inevitably parts of multi-level security systems or trusted networks. They can introduce security risk into system, as they don't comply with *-property in Bell LaPadula model. It's an important work to determine which subjects are trusted from hundreds and thousands of applications, and what their security requirements are during the developing and deploying secure operating systems. In this paper, an approach is proposed to address these issues based on information flow and risk analysis. Type enforcement specification is used as a base for information flow analysis and then finding out trusted subjects and their security requirements:security label range and security assurance level. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1007/978-3-642-25283-9_7 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Keywords | Field | DocType |
information flow analysis,trusted subjects configuration,multi-level security system,information flow,te model,security label range,trusted subject,bell lapadula model,security assurance level,security requirement,mls system,security risk,risk analysis | Bell–LaPadula model,Trusted Network Connect,Computer security,Computer science,Covert channel,Trusted Platform Module,Security service,Direct Anonymous Attestation,Trusted computing base,Computer security model | Conference |
Volume | Issue | ISSN |
6802 LNCS | null | 16113349 |
Citations | PageRank | References |
0 | 0.34 | 8 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shangjie Li | 1 | 0 | 0.34 |
Yeping He | 2 | 77 | 14.64 |