In: Computer Science
Consider a system that combines the Military security policy and Bell-LaPadula confidentiality model. Given the security levelsTOP SECRET, SECRET, CONFIDENTIAL, andUNCLASSIFIED (ordered from highest to lowest), and compartments Students, Faculty, Staff, andContractors specify what type of access (read, write, both, none) is allowed in each of the following situations.
a) John, cleared for (TOP SECRET, {Faculty, Staff, Students}), wants to access a document classified as (TOP SECRET, {Faculty, Staff, Contractors}).
b) Bill, cleared for (CONFIDENTIAL, {Faculty, Students}), wants to access a document classified as (CONFIDENTIAL, {Students}).
c) Janet, cleared for (SECRET, {Faculty, Students}), wants to access document classified as (CONFIDENTIAL, {Faculty}).
d) Pete, cleared for (CONFIDENTIAL, {Faculty, Staff}), wants to access a document classified as (SECRET, {Staff}).
e) Chris, cleared for (CONFIDENTIAL, {Staff}) wants to access a document classified as (UNCLASSIFIED, {Staff}).
a) Read access only as contractors data write access should not be given to John.
b) Bill will be able to get a read and write access.
c) Janet can have read and write access as she has cleared the exam for a higher ordered security level.
d) None, as Pete has cleared for confidential whereas trying to access the secret files which is of a higher security level.
e) Chris has cleared confidential for staff hence he can have the read and write access both.