• DocumentCode
    234975
  • Title

    An Improved Method of Access Control Based on BLP Model in MILS

  • Author

    Kaiqiang Li ; Hao Feng ; Yahui Li ; Zhiwei Zhang

  • Author_Institution
    Sch. of Comput. Sci. & Technol., Xidian Univ., Xi´an, China
  • fYear
    2014
  • fDate
    15-16 Nov. 2014
  • Firstpage
    588
  • Lastpage
    592
  • Abstract
    MILS (Multiple Independent Levels of Security) is a high-assurance architecture that protect different security levels information sharing. In order to provide guarantee for a variety of information sharing security, MILS allow software components that have multiple security levels or multiple data domain to run on a single processor. But in specific applications, in order to achieve multiple information interaction and sharing between partitions, the problem of which illegal authorization, unauthorized access and malicious disclosure of sensitive information between different levels of applications will be introduced. From the point of information flow control, the paper put forward a model and method of information flow security control strictly between MILS partitions based on trusted computing. We designed a model based on BLP and access control model of state transition strategy, the policies break the traditional BLP model rules " read down, write up", which meet the needs of the security level for subjects and objects according to the changes of task requirements in MILS. After analyzing, the model can efficaciously protect confidentiality and integrity of the sensitive information, and improve the dependability of the whole system.
  • Keywords
    authorisation; data flow analysis; data integration; BLP model; MILS partitions; access control method; access control model; high-assurance architecture; illegal authorization; information flow security control; information sharing security; malicious disclosure; multiple data domain; multiple independent level-of-security; multiple information interaction; multiple information sharing; read-down-write-up rules; security level information sharing protection; sensitive information confidentiality protection; sensitive information integrity protection; software components; state transition strategy; system dependability improvement; trusted computing; unauthorized access; Access control; Aerospace electronics; Computational modeling; File systems; Kernel; Protocols; BLP; MILS; information flow control; security policy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security (CIS), 2014 Tenth International Conference on
  • Conference_Location
    Kunming
  • Print_ISBN
    978-1-4799-7433-7
  • Type

    conf

  • DOI
    10.1109/CIS.2014.39
  • Filename
    7016964