Abstract
The rule of “No-Down-Write” of BLP model restrict its applying in application system because “Down-Write” is often necessary in real life. A new access control model based on Confidential level extended BLP model was researched because of the conflicts. A range of Confidential level is given to the subjects and a confidential rule set is established to endow the subject with the capability of writing down in a bound when it satisfied the confidential rules. The model enforces MAC. The definitions, security check rules, axioms of the model are illustrated in the paper. The model was applied in a multilevel secure DBMS development. The implementation is introduced in short at last.
The paper is supported by 973 project of China (Grant No. TG1999035801)
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bell, D.E., La Padula, L.J.: Secure Computer Systems: A Refinement of the Mathematical Fundations. [J],ESD-TR-73-278, Vol. III, AD 780 528, Electronic Systems Division, Air Force System Command, Hanscom AFB, Bedford, Massachusetts (November 1974)
Biba, K.J.: Integrity Considerations for Secure Computer Systems. [J], ESD-TR-76_372, Hanscom AFB, MASS.: Air Force Electronic Systems Division (1977)
Denning, D.E., Lunt, T.F.: The SeaView Security Model. In: Proceedings of the IEEE Symposium on Security and Privacy 1988, April 1988, pp. 218–233 (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, X., Han, Z., Sheng, Kj., Shen, Cx. (2005). Research on Confidential Level Extended BLP Model. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3684. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554028_37
Download citation
DOI: https://doi.org/10.1007/11554028_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28897-8
Online ISBN: 978-3-540-31997-9
eBook Packages: Computer ScienceComputer Science (R0)