Question

In: Computer Science

Some of the well-known and best studied security models are listed below. Select a security model,...

Some of the well-known and best studied security models are listed below. Select a security model, research and submit a detailed post.

1. Bell-LaPadula Confidentiality Model
2. Biba Integrity Model
3. Clark-Wison (well-formed transaction) Integrity Model
4. Brewer-Nash (Chinese Wall)

Solutions

Expert Solution

The Bell-Lapadula Model of protection systems deals with the control of information flow. It is a linear non-discretionary model. This model of protection consists of the following components:

  • A set of subjects, a set of objects, and an access control matrix.
  • Several ordered security levels. Each subject has a clearance and each object has a classification which attaches it to a security level. Each subject also has a current clearance level which does not exceed its clearance level. Thus a subject can only change to a clearance level below its assigned clearance level.

The set of access rights given to a subject are the following:

  • Read-Only: The subject can only read the object.
  • Append : The subject can only write to the object but it cannot read.
  • Execute : The subject can execute the object but can neither read nor write.
  • Read-Write: The subject has both read and write permissions to the object.

Control Attribute: This is an attribute given to the subject that creates an object. Due to this, the creator of an object can pass any of the above four access rights of that object to any subject. However, it cannot pass the control attribute itself. The creator of an object is also known as the controller of that object.

Restrictions imposed by the Bell-Lapadula Model:

The following restrictions are imposed by the model:

  • reading down: A subject has only read access to objects whose security level is below the subject's current clearance level. This prevents a subject from getting access to information available in security levels higher than its current clearance level.
  • writing up: A subject has append access to objects whose security level is higher than its current clearance level. This prevents a subject from passing information to levels lower than its current level.

The Bell-Lapadula model supplements the access matrix with the above restrictions to provide access control and information flow. For instance, if a subject has read access to an object in the access matrix, it may still not be able to exercise this right if the object is at a security level higher than its clearance level.

Bell and Lapadula modeled the behavior of a protection system as a finite state machine and defined a set of state transitions that would not violate the security of the system. The following operations gaurantee a secure system:

  • get access: Used by a subject to initiate access to an object (read, append, execute etc )
  • release access: Used by a subject to giveup an initiated access.
  • give access: Controller of an object can give a particular access (to that object) to a subject.
  • rescind access: Controller of an object can revoke a designated access ( to that object) from a subject.
  • create object: Allows a subject to activate an inactive object.
  • delete object: Allows a subject to deactivate an active object.
  • change security level:Allows a subject to change its clearance level ( below an initial assigned value)

However certain conditions have to be satisfied before the above operations can be performed. For instance, a subject can exercise give and rescind rights to an object only if it has control attributes to that object.

Bell-Lapadula is a simple linear model that exercises access and information flow control through the above restrictive properties and operations. However, it has a disadvantage of security levels of objects being static. The properties of this model might become too restrictive in cases when certain operations are outside the context of protection system.


Related Solutions

Research, select and describe, in your view, the best Security Model found
Research, select and describe, in your view, the best Security Model found
Select a cultural competency model below that best supports Indian Culture, and explain why the model...
Select a cultural competency model below that best supports Indian Culture, and explain why the model was selected. Use the model to address techniques and challenges in providing culturally competent health care/services to your specific population. ■Berlin and Fowkes’ LEARN model (Effective Communication) - Created as a tool to improve communication in patient-physician interactions.Supplement to history taking. ■Cross Cultural Competence Continuum (Developmental) ■Campinha-Bacote (Developmental) - the framework of cultural competence is defined in the process of cultural competence in the...
Suppose that Raven studied for the Graduate Management Admission Test (GMAT) using a well-known preparation class...
Suppose that Raven studied for the Graduate Management Admission Test (GMAT) using a well-known preparation class and was thrilled to receive a total score of 770. Her friend Eric, however, thinks she would have scored just as well without the class. To test the efficacy of the class, they obtain a small but random sample of 19 test results from other students using the same class. This sample's average is 568.56 with a standard deviation of 116.72. In comparison, the...
Review the variety of graphic representations of servant leadership models and other leadership/management models listed below....
Review the variety of graphic representations of servant leadership models and other leadership/management models listed below. You may search online for others as well. As you review the models, consider what you think are the most significant differences between servant leadership models and other models. Then either create your own graphic to visually represent your understanding of servant leadership or revise one of the existing graphics so that it better represents your understanding. If you revise an existing model, be...
Verification and Validation of Simulation Models 3. How to build a model that is well connected...
Verification and Validation of Simulation Models 3. How to build a model that is well connected with the verification and validation process? 4. What is meant by calibration, and what is the process of calibration so that it can obtain a model that means to be used for simulation?
Fill in the blanks USING THE TERMS LISTED BELOW, (10 TERMS LISTED) CHOOSE THE BEST ANSWERS...
Fill in the blanks USING THE TERMS LISTED BELOW, (10 TERMS LISTED) CHOOSE THE BEST ANSWERS TO FILL IN THE BLANKS. Paragraph #1: Mark, an investor, examines the financial statements of Disney. He calculates gross profit of services and does a year-to-year variance comparison of service revenues and costs of services. Paragraph #2: Mark then compares the net income taking into account the non-cash activity of Disney (adding it back) as well as the other expenses that he feels do...
Questions to Answer: What are some of the best practices for Security In the Public Cloud?...
Questions to Answer: What are some of the best practices for Security In the Public Cloud? With regard to Security: Do any of the approaches differ in the Public Cloud than they do in on premise deployments? Did you find any any providers guidance (AWS, etc.) on migration and associated security considerations? Provide examples that you encountered within your research and indicate what portions will apply to each stage of your migration. Systems Availability: What issues does Public Cloud computing...
What software process models are the best and why ? and I want  3 well-reasoned statements for...
What software process models are the best and why ? and I want  3 well-reasoned statements for not choosing the models Also, write a short critique of the each process. There are  3 general process model: -The waterfall model -Incremental development -Integration and configuration
Choose a well-known company that uses the EOQ model and how does this company use this...
Choose a well-known company that uses the EOQ model and how does this company use this method to manage their inventory?
For each of the audit procedures listed in the table below, select the type of audit...
For each of the audit procedures listed in the table below, select the type of audit test the procedure represents, type of evidence the procedure collect, and the primary assertion that the procedure supports, using the lists indicate the corresponding letter in the appropriate box. Type of test Type of evidence Assertion A- Analytical procedure A- Inspections of tangible assets A- Existence/Occurrence B- Test of Control B- Confirmation B- Completeness C- Test of Transactions C- Inspection of documents and records...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT