Elsevier

Computers & Security

Volume 6, Issue 3, June 1987, Pages 219-228
Computers & Security

Design and administration of distributed and hierarchical information networks under partial orderings

https://doi.org/10.1016/0167-4048(87)90103-9Get rights and content

Abstract

In this paper, we extend previous results [1] in the protection and administration of information networks under partial orderings. We summarize previous results, and extend them to cover hierarchical networks. We consider distributed hierarchical administration, show a hierarchical network, and demonstrate a provably secure communications technique in which partial orderings are used to control flow, traffic analysis is minimized, local compromise does not cause global compromise, and distributed hierarchical administration works. We show means by which trusted and untrusted computing bases may be connected to form provably secure distributed information networks under partial orderings, and a risk analysis technique which takes advantage of the POset structure to reduce the complexity of analysis for these networks. We summarize results and propose further extensions of this work.

References (9)

  • F. Cohen, “Protection and Administration of Information Networks with Partial Orderings.” Computers and Security, Vol....
  • F. Cohen

    Computer Viruses

    (Jan. 1986)
  • D. Bell et al.

    Secure Computer Systems: Mathematical Foundations and Model

    (1973)
  • K. Biba

    Integrity Considerations for Secure Computer Systems

    (1977)
There are more references available in the full text version of this article.

Cited by (4)

  • A DOS-based POset implementation

    1991, Computers and Security
  • Two secure file servers

    1988, Computers and Security
View full text