Skip to main content

Research on Confidential Level Extended BLP Model

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3684))

  • 1459 Accesses

Abstract

The rule of “No-Down-Write” of BLP model restrict its applying in application system because “Down-Write” is often necessary in real life. A new access control model based on Confidential level extended BLP model was researched because of the conflicts. A range of Confidential level is given to the subjects and a confidential rule set is established to endow the subject with the capability of writing down in a bound when it satisfied the confidential rules. The model enforces MAC. The definitions, security check rules, axioms of the model are illustrated in the paper. The model was applied in a multilevel secure DBMS development. The implementation is introduced in short at last.

The paper is supported by 973 project of China (Grant No. TG1999035801)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bell, D.E., La Padula, L.J.: Secure Computer Systems: A Refinement of the Mathematical Fundations. [J],ESD-TR-73-278, Vol. III, AD 780 528, Electronic Systems Division, Air Force System Command, Hanscom AFB, Bedford, Massachusetts (November 1974)

    Google Scholar 

  2. Biba, K.J.: Integrity Considerations for Secure Computer Systems. [J], ESD-TR-76_372, Hanscom AFB, MASS.: Air Force Electronic Systems Division (1977)

    Google Scholar 

  3. Denning, D.E., Lunt, T.F.: The SeaView Security Model. In: Proceedings of the IEEE Symposium on Security and Privacy 1988, April 1988, pp. 218–233 (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, X., Han, Z., Sheng, Kj., Shen, Cx. (2005). Research on Confidential Level Extended BLP Model. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3684. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554028_37

Download citation

  • DOI: https://doi.org/10.1007/11554028_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28897-8

  • Online ISBN: 978-3-540-31997-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics