Synonyms
Related Concepts
Definition
The Bell and La Padula Model is a state-based computer security model that is the most widely used model for the production and evaluation of commercial products and systems approved for operational use. It was developed and explicated in a series of four technical reports between 1972 and 1974. The first three reports provided an ability to describe three aspects of security called “simple-security,” “discretionary-security,” and “ ⋆ -property” (pronounced “star-property”) and produced analytical tools for use in evaluating products and systems for conformance to those three aspects of security. The fourth report unified the exposition of the previous three reports and provided the first “model interpretation,” providing a careful correspondence between the Multics system and the model. Later work refined the analytical tools...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Anderson JP (1972) Computer security technology planning study. ESD-TR-73-51, vol I, AD-758 206, ESD/AFSC, Hanscom AFB, Massachusetts
Brewer D, Nash M (1989) The Chinese wall security policy. In: Proceedings of the 1989 IEEE symposium on security and privacy, Oakland, May 1989, pp 206–214
Clark D, Wilson D (1987) A comparison of commercial and military computer security policies. In: Proceedings of the 1987 IEEE symposium on security and privacy, Oakland, 27–29 Apr 1987, pp 184–194
Department of Defense Trusted Computer System Evaluation Criteria, CSC-STD-001-83, 15 Aug 1983
Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, Dec 1985
Bell D Elliott (1973) Secure computer systems: a refinement of the mathematical model, MTR-2547, vol III. The MITRE Corporation, Bedford, p 25 (ESD-TR-73-278-III)
Bell D Elliott (1973) Secure computer systems: a network interpretation. In: Proceedings of the second aerospace computer conference, McLean, 2–4 Dec 1986, pp 32–39
Bell D Elliott (1990) Lattices, policies, and implementations. In: Proceedings of the 13th national computer security conference, Washington, DC, 1–4 Oct 1990, pp 165–171
Bell D Elliott (1991) Putting policy commonalities to work. In: Proceedings of the 14th national computer security conference, Washington, DC, 1–4 Oct 1991, pp 456–471
Bell D Elliott (2005) Looking back at the Bell-La Padula model. In: Proceedings of the ACSAC, Tucson, AZ, 7–9 Dec 2005, pp 337–351
Bell D Elliott, La Padula LJ (1973) Secure computer systems: mathematical foundations, MTR-2547, vol I. The MITRE Corporation, Bedford (ESD-TR-73-278-I)
Bell D Elliott, La Padula LJ (1975) Secure computer systems: unified exposition and multics interpretation, MTR-2997. The MITRE Corporation, Bedford (ESD-TR-75-306)
Graham GS, Denning PJ (1972) Protection – principles and practice. In: Proceedings of the SJCC, Atlantic City, NJ, pp 417–429
La Padula LJ, Bell D Elliott (1973) Secure computer systems: a mathematical model, MTR-2547, vol. II. The MITRE Corporation, Bedford (ESD-TR-73-278-II)
Saltzer J (1974) Protection and the control of information in Multics. Comm ACM 17(7):388–402
Thompson K (1989) On trusting trust. Unix Rev 7(11): 70–74
Ware W (ed) (1972) Defense Science Board report, Security controls for computer systems, RAND Report R-609
Weissman C (1969) Security controls in the ADEPT-50 Time-Sharing System. In: AFIPS conference proceedings, vol 35, FJCC, Montvale, NJ, 1969, pp 119–133
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Elliott Bell, D. (2011). Bell–La Padula Model. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_811
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_811
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering