Question

In: Computer Science

Develop a construction to show that a system implementing the Chinese Wall model can support the...

Develop a construction to show that a system implementing the Chinese Wall model can support the Bell-LaPadula Model.

Solutions

Expert Solution

The Chinese Wall model is a security model that concentrates on confidentiality and finds itself application in the commercial world. The model bases itself on the principles defined in the Clark Wilson security model.

The Chinese Wall model was introduced by Brewer and Nash in 1989. The model was built on the UK stock brokerage operations. The stock brokers can be consulted by different companies that are in competition. This causes a conflict of interest, which should be prevented with lawfully enforceable policies. Similar to the UK brokerage system, the Chinese Wall model assumes impenetrable Chinese Walls among company data sets, so that no conflict of interest occurs on the same side of the wall.

The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by David Elliott Bell  and Leonard J. LaPadula, subsequent to strong guidance from Roger R. Schell, to formalize the U.S. Department of Defense (DoD) multilevel security (MLS) policy. The model is a formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and clearances for subjects.

To emulate the Chinese Wall model using Bell-LaPadula, we assign asecurity category to each (COI, CD) pair. We define two security levels, S (forsanitized) and U (for unsanitized). By assumption, S dom U. illustratesthis mapping for the system in Each object is transformed into twoobjects, one sanitized and one unsanitized. Each subject in the Chinese Wallmodel is then assigned clearance for the compartments that do not containmultiple categories corresponding to CDs in the same COI class. For example, ifSusan can read the Bank of America and ARCO CDs, her processes would haveclearance for compartment (U, {a, n}). There are three possible clearances fromthe bank COI class, and four possible clearances from the gasoline company COIclass, combining to give 12 possible clearances for subjects. Of course, allsubjects can read all sanitized data. The CW-simple security condition clearlyholds. The CW-*-property also holds, because the Bell-LaPadula *-propertyensures that the category of input objects is a subset of the category of outputobjects. Hence, input objects are either sanitized or in the same category (thatis, the same CD) as that of the subject. This construction shows that at any timethe Bell-LaPadula Model can capture the state of a system using the Chinese Wallmodel. But the Bell-LaPadula Model cannot capture changes over time. Forexample, suppose Susan falls ill, and Anna needs to access one of the datasetsto which Susan has access. How can the system know if Anna is allowed toaccess that dataset? The Chinese Wall model tracks the history of accesses, fromwhich Anna’s ability to access the CD can be determined.

Element of the model

  • Company denoted c ∈ C
  • Subjects s ∈ S are the analysts having access to company information
  • Objects o ∈ O are items of information, each belonging to a company
  • Company dataset are all objects concerning a company ◦ Function y : O → C maps object to its company dataset
  • Conflict of interest class indicates which companies are in competition ◦ Function x : O → P (C) maps object to its conflict of interest class, an element in the powerset of C
  • Security label is a pair (x(o), y(o))
  • Sanitized information is object with no sensitive information ◦ Label is (∅,y(o))
  • Matrix NS,O records history of subjects actions (true or false)

Access granted only if object belongs to ◦ A data set already accessed by the subject or ◦ A different conflict of interest class than previous objects ss-property

A subject s is permitted to access an object o only if for all objects o’ with Nso’ = true, y(o)=y(o’) or y(o) ∉ x(o’)

Analyst A updates bank information about company A  Analyst B can read this bank information and write to an object in company B

*-property regulates write access

Very restrictive: If you can read sensitive information in one company, you can not write to objects in any other company – ever

The Bell-LaPadula Model cannot capture changes over time. second, more serious problem arises when one considers that subjects in the Chinese Wall model may choose which CDs(company dataset) to access; in other words, initially a subject is free to access all objects. The Bell-LaPadula Model cannot emulate the Chinese Wall model.


Related Solutions

Develop a transient numerical model for the Trombe wall,
Develop a transient numerical model for the Trombe wall,
Develop a model to show how changes in the money supply can affect investment, income, unemployment...
Develop a model to show how changes in the money supply can affect investment, income, unemployment and inflation.
Reviewing the System/Software Development Life Cycle (SDLC) model and methodology then show how this model can...
Reviewing the System/Software Development Life Cycle (SDLC) model and methodology then show how this model can be use in web design. Be sure to define the SDLC model and methodology and identify which SDLC step is associated with each project component
Develop a model and a chart to show how the value of a European QQQ call...
Develop a model and a chart to show how the value of a European QQQ call option varies with the price of the underlying stock. Make the chart dynamic by allowing the user to change all of the other variables that affect the price of the option. On the same graph, draw the option price and option payoff versus the stock price. What do you observe on this graph? Please, explain.
In implementing Electronic document management system (EDMS), develop business requirements document (BRD) that details the requirements...
In implementing Electronic document management system (EDMS), develop business requirements document (BRD) that details the requirements and design for an enterprise EDMS. This should to address creating a new EDMS to be used by a company to store and track all e-documents. Also, • Identify the types of e-documents and other content that can be created • For each type of e-document, provide an example e-document • Define the key personnel within who require access to the EDMS.
Explain how you will develop rapport, exhibit empathy, model and demonstrate trust, model authenticity, and show...
Explain how you will develop rapport, exhibit empathy, model and demonstrate trust, model authenticity, and show other people appreciation?
3.5          Drop/remove the insignificant independent variable from the regression model, and develop and show an updated...
3.5          Drop/remove the insignificant independent variable from the regression model, and develop and show an updated estimated regression equation that can be used to predict the average annual salary for salaried employees given the average annual salary for hourly employees and the size of the company. Again, use the F test and α = 0.05 to test for overall significance. Also use the t test and α = 0.05 to determine the significance of the independent variables in this updated...
Develop a detailed model the inverted pendulum system in MatLab/Simulink (a feedback compensator to stabilise and...
Develop a detailed model the inverted pendulum system in MatLab/Simulink (a feedback compensator to stabilise and control the dynamics of a rotating inverted pendulum, as described in Microchip Application Note AN964, “Software PID Control of an Inverted Pendulum Using the PIC16F684” by Charais and Lourens. T)
discuss the chalanges in implementing accounting information system (AIS) at any organization can you explain it...
discuss the chalanges in implementing accounting information system (AIS) at any organization can you explain it to me in points please?
Develop the best logistic regression model that can predict the wage by using the combination of...
Develop the best logistic regression model that can predict the wage by using the combination of any following variables: total unit (X2), constructed unit (X3), equipment used (X4), city location (X5) and total cost of a project (X6). Make sure that you partition your data with 60% training test, 40% validation test, and default seed of 12345 before running the logistic regression (15 points) Wage - X1 Total Unit - X2 Contracted Units - X3 Equipment Used - X4 City...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT