Question

In: Computer Science

A.Consider the Bell-LaPadula confidentiality model. Can a subject labeled ( “Secret”, {“France”} ) read the object...

A.Consider the Bell-LaPadula confidentiality model. Can a subject labeled ( “Secret”, {“France”} ) read the object labeled (“Top Secret”, {“France”,”Germany”} )?

What property (rule) is applied to allow or to deny this operation?

B. Consider the Biba integrity model. Can a subject labeled
( “Secret”, {“Germany”} ) write to the object labeled ( “Top Secret”, {“France”,”Germany”} )?
What property (rule) is applied to allow or to deny this operation?

Solutions

Expert Solution

Q1:

A)

Ans:

According to Bell-LaPadula confidentiality model, a subject labelled ( “Secret”, {“France”} ) CANNOT read the object labelled (“Top Secret”, {“France”,“Germany”} ) due to the application of : The Simple Security Rule (also known as the No Read Up rule or Reading Down Rule) which states that: “An object/entity at a classification/security level cannot read the object/entity at a higher classification/security level than the entity itself.” Here, the Top Secret security level is having a higher classification level than the Secret security level hence, ( “Secret”, {“France”} ) CANNOT read the object labelled (“Top Secret”, {“France”,“Germany”} )

B)

Ans:

According to Bell-LaPadula confidentiality model, a subject labelled ( “Secret”, {“Germany”} ) CAN write to the object labelled ( “Top Secret”, {“France”,“Germany”} ) due to the application of : The Star Property Rule (also known as the No Write Down rule or Writing Up Rule) which states that: “An object/entity at a classification/security level can write/append data to the object/entity at a higher classification/security level than the entity itself.” Here, the Secret security level is having a lower classification level than the Top Secret security level hence, ( “Secret”, {“Germany”} ) CAN write to the object labelled ( “Top Secret”, {“France”,“Germany”} )

(Thank You!!, please consider upvoting if it was helpful!!)


Related Solutions

Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to...
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to file A, can append to file B, and can write to file C. Maha can read file A, can write to file B, and cannot access file C. Write the access control matrix M that specifies the described set of access rights for subjects Nada and Maha to objects file A, file B and file C. Then the subject’s security levels are LNada= Confidential...
Fitting a linear model using R a. Read the Toluca.txt dataset into R (this dataset can...
Fitting a linear model using R a. Read the Toluca.txt dataset into R (this dataset can be found on Canvas). Now fit a simple linear regression model with X = lotSize and Y = workHrs. Summarize the output from the model: the least square estimators, their standard errors, and corresponding p-values. b. Draw the scatterplot of Y versus X and add the least squares line to the scatterplot. c. Obtain the fitted values ˆyi and residuals ei . Print the...
In section 2.1 you read about how we can model certain situations using linear equations. In...
In section 2.1 you read about how we can model certain situations using linear equations. In particular, example 8 shows how you can create an equation to predict sales of a company Pick a company whose sales you want to model and predict. Look up their sales information and pick 2 years of data. Using that information, create a linear equation that can be used to predict the sales of the company. Once you have your equation, predict the sales...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT