Abstract
In this paper we describe the architecture of a computer machine ensuring a protection for data and processes of various classification levels, concurrently running on behalf of various cleared users. The security, enforced by a hardware security subsystem, is based on an internal information flow control that prevents building any illicit channel. Mechanisms and services of standard operating systems may be built on this machine. It permits also to build and manage multilevel data structures and multilevel computations which are able to satisfy the highest security requirements of new applications.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bieber, F. Cuppens and G. Eizenberg: Fondements théoriques de la Sécurité Informatique. Rapport 2/3366.00/DERI, Centre d'Etudes et de Recherches de Toulouse, 1990.
K. J. Biba: Integrity Considerations for Secure Computer Systems, Technical Report ESD-TR-76-372, ESD/AFSC, Hanscom AFB, Bedford, Mass., 1977. Also MITRE MTR-3153.
D.E. Bell, L.J. LaPadula: “Secure Computer Systems: Unified Exposition and Multics Interpretation”-MTR-75-306, MITRE Corporation, Bedford, Mass, March 1975
J. M. Beckman, J.R. Leaman and O.S. Saydjari: LOCK trak: Navigating Uncharted Space, IEEE Symposium on Security and Privacy, Oakland, 1989.
Trusted Computer Systems Evaluation Criteria.Technical report DoD 5200.28-STD, National Computer Security Center, Fort Meade, MD, December 1985
G.Eizenberg: Mandatory policy: secure system model. In AFCET, editor, European Workshop on Computer Security, Paris, 1989.
L. J. Fraim: Scomp, a solution to the Multilevel Security Problem. In IEEE Computer, July 1983.
J. Goguen and J. Meseguer: Unwiding and Inference Control. IEEE Symposium on Security and Privacy, Oakland, 1984.
Panel SessionKernel Performance Issues, Proc. Symp. Security and Privacy, IEEE Cat. No 81CH1629-5, Oakland, Calif.,1981.
E. J. McCauley and P. J. Drongowski: KSOS The Design of a Secure Operating System, AFIPS Conf. Proc., Vol 48, AFIPS Press, Montvale, N.J., 1979.
G. J. Popek: UCLA Secure Unix, AFIPS Conf. Proc., Vol. 48, 1979 NCC, AFIPS Press, Montvale, N.J., 1979.
M. Schaffer and G. Walsh: LOCK/ix: On implementing Unix on the LOCK TCB, 11th NCSC Conference, 1988.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1992 Springer-Verlag
About this paper
Cite this paper
d'Ausbourg, B., Llareus, JH. (1992). M2S: A machine for multilevel security. In: Deswarte, Y., Eizenberg, G., Quisquater, JJ. (eds) Computer Security — ESORICS 92. ESORICS 1992. Lecture Notes in Computer Science, vol 648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013908
Download citation
DOI: https://doi.org/10.1007/BFb0013908
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56246-7
Online ISBN: 978-3-540-47488-3
eBook Packages: Springer Book Archive