DocumentCode :
234975
Title :
An Improved Method of Access Control Based on BLP Model in MILS
Author :
Kaiqiang Li ; Hao Feng ; Yahui Li ; Zhiwei Zhang
Author_Institution :
Sch. of Comput. Sci. & Technol., Xidian Univ., Xi´an, China
fYear :
2014
fDate :
15-16 Nov. 2014
Firstpage :
588
Lastpage :
592
Abstract :
MILS (Multiple Independent Levels of Security) is a high-assurance architecture that protect different security levels information sharing. In order to provide guarantee for a variety of information sharing security, MILS allow software components that have multiple security levels or multiple data domain to run on a single processor. But in specific applications, in order to achieve multiple information interaction and sharing between partitions, the problem of which illegal authorization, unauthorized access and malicious disclosure of sensitive information between different levels of applications will be introduced. From the point of information flow control, the paper put forward a model and method of information flow security control strictly between MILS partitions based on trusted computing. We designed a model based on BLP and access control model of state transition strategy, the policies break the traditional BLP model rules " read down, write up", which meet the needs of the security level for subjects and objects according to the changes of task requirements in MILS. After analyzing, the model can efficaciously protect confidentiality and integrity of the sensitive information, and improve the dependability of the whole system.
Keywords :
authorisation; data flow analysis; data integration; BLP model; MILS partitions; access control method; access control model; high-assurance architecture; illegal authorization; information flow security control; information sharing security; malicious disclosure; multiple data domain; multiple independent level-of-security; multiple information interaction; multiple information sharing; read-down-write-up rules; security level information sharing protection; sensitive information confidentiality protection; sensitive information integrity protection; software components; state transition strategy; system dependability improvement; trusted computing; unauthorized access; Access control; Aerospace electronics; Computational modeling; File systems; Kernel; Protocols; BLP; MILS; information flow control; security policy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security (CIS), 2014 Tenth International Conference on
Conference_Location :
Kunming
Print_ISBN :
978-1-4799-7433-7
Type :
conf
DOI :
10.1109/CIS.2014.39
Filename :
7016964
Link To Document :
بازگشت