Question

In: Computer Science

(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model?


(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model? 

(b) Consider the following documents that have been created within the Bell-LaPadula security model. The levels are: top secret (ts), secret (s), confidential (c), and unclassified (uc). In addition to these levels, there are the following categories: development (D), production code (PC), and software tools (T) 

Document 1: c, {D, T} 

Document 2: s, {T, PC} 

Document 3: ts, { } 

Document 4: uc, {D, T, PC} 

Alice has secret clearance with access to the categories {D, T}. Determine which documents Alice can read. Determine also which documents Alice can write to. 

Solutions

Expert Solution

Answer a

Bell-LaPadula model focuses on data confidentiality and controlled access to the classified information. In this subject has a security clearance and object has a security classification for e.g. Top Secret, Secret, Confidential etc. Main focus is to decide the manner by which a subject may access a object.

Security level

Subject

Object

Top Secret

Tamara

Personnel Files

Secret

Samuel

E-Mail Files

Confidential

Claire

Activity Logs

Unclassified

James

Telephone Lists

This means Tamara can read all files but Claire cannot read personal and email files.

On the other side, Clark-Wilson focuses on Integrity of data rather than confidentiality. It relies on two concepts to make sure data integrity.

1. Well Formed Transactions: User can manipulate data only in constrained way.

2. Separation of Duty: One can create the transaction but not execute it.

These are the basic terminology used in this model.

CDI: constrained data items (loan app; checks)

UDI: unconstrained items

IVPs: procedures that assure all CDIs conform to integrity/consistency rules

TPs: transactions that change CDIs

Below rules are certified and enforced in this model.

C1: IVPs must ensure that all CDIs are in valid states

C2: All TPs must be certified (must take a CDI from a valid state to a valid final state) –(Tpi, CDIa, CDIb, CDIc, …)

E1: The system must maintain a list of relations specified in C2

E2: The system must maintain a list of (User, Tpi, (CDIa, CDIb, …))

C3: The list of relations in E2 must be certified to meet separation of duties

E3 The system must authenticate each user when executing a TP

C4: All TPs must be certified

C5: Any TP that takes UDI as in input value must be certified to perform valid transaction

E4: Only the agent permitted to certify entitles is allowed to do so

Answer b:

According to this model these two rules are followed when deciding read and write.

1. No Read Up - A subject can only read an object of less or equal security level.

2. No Write Down - A subject can only write an object of greater or equal security level.

Now, Alice has security clearance with access to the {D, T} Categories means document 1 type of data which has Confidential level assigned.

Now confidential level is higher than the unclassified so Alice can also read document 4 which is {D, T, PC} apart from document 1.

Confidential level is lower than the Secret and Top Secret so Alice can write only in document 1 and document 2 which is {T, PC}. Alice also can write in document 3 but there is no item in document 3.


Related Solutions

How does a TIPS bond differ from the typical U.S. Treasury security?
How does a TIPS bond differ from the typical U.S. Treasury security?
1) How does a bailment differ from a gift? 2) How does a bailment differ from...
1) How does a bailment differ from a gift? 2) How does a bailment differ from a lease? 3) Give an example of a bailment that is not a contract. Give an example of a bailment that is a contract.
How does a disclaimer differ from a qualified report in the PCAOB new reporting model?
How does a disclaimer differ from a qualified report in the PCAOB new reporting model?
Describe the Spine Center model. How does it differ from prevailing approaches to the delivery of...
Describe the Spine Center model. How does it differ from prevailing approaches to the delivery of spine care?
How does bank regulation differ from bank supervision? What are the main roles and functions of...
How does bank regulation differ from bank supervision? What are the main roles and functions of bank regulators? Discuss.
how does urine differ from blood
how does urine differ from blood
How does hospice and palliative care differ from the traditional medical model of health care delivery?...
How does hospice and palliative care differ from the traditional medical model of health care delivery? What are the benefits to patients who elect these services in lieu of traditional medical care?
How does hospice and palliative care differ from the traditional medical model of health care delivery?...
How does hospice and palliative care differ from the traditional medical model of health care delivery? What are the benefits to patients who elect these services in lieu of traditional medical care?
8. The Capital Asset Pricing Model and the security market line Wilson holds a portfolio that...
8. The Capital Asset Pricing Model and the security market line Wilson holds a portfolio that invests equally in three stocks (wAwA = wBwB = wCwC = 1/3). Each stock is described in the following table: Stock Beta Standard Deviation Expected Return A 0.5 23% 7.5% B 1.0 38% 12.0% C 2.0 45% 14.0% An analyst has used market- and firm-specific information to generate expected return estimates for each stock. The analyst’s expected return estimates may or may not equal...
How does FTD differ from Alzheimer’s disease
How does FTD differ from Alzheimer’s disease
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT