DocumentCode
234975
Title
An Improved Method of Access Control Based on BLP Model in MILS
Author
Kaiqiang Li ; Hao Feng ; Yahui Li ; Zhiwei Zhang
Author_Institution
Sch. of Comput. Sci. & Technol., Xidian Univ., Xi´an, China
fYear
2014
fDate
15-16 Nov. 2014
Firstpage
588
Lastpage
592
Abstract
MILS (Multiple Independent Levels of Security) is a high-assurance architecture that protect different security levels information sharing. In order to provide guarantee for a variety of information sharing security, MILS allow software components that have multiple security levels or multiple data domain to run on a single processor. But in specific applications, in order to achieve multiple information interaction and sharing between partitions, the problem of which illegal authorization, unauthorized access and malicious disclosure of sensitive information between different levels of applications will be introduced. From the point of information flow control, the paper put forward a model and method of information flow security control strictly between MILS partitions based on trusted computing. We designed a model based on BLP and access control model of state transition strategy, the policies break the traditional BLP model rules " read down, write up", which meet the needs of the security level for subjects and objects according to the changes of task requirements in MILS. After analyzing, the model can efficaciously protect confidentiality and integrity of the sensitive information, and improve the dependability of the whole system.
Keywords
authorisation; data flow analysis; data integration; BLP model; MILS partitions; access control method; access control model; high-assurance architecture; illegal authorization; information flow security control; information sharing security; malicious disclosure; multiple data domain; multiple independent level-of-security; multiple information interaction; multiple information sharing; read-down-write-up rules; security level information sharing protection; sensitive information confidentiality protection; sensitive information integrity protection; software components; state transition strategy; system dependability improvement; trusted computing; unauthorized access; Access control; Aerospace electronics; Computational modeling; File systems; Kernel; Protocols; BLP; MILS; information flow control; security policy;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Security (CIS), 2014 Tenth International Conference on
Conference_Location
Kunming
Print_ISBN
978-1-4799-7433-7
Type
conf
DOI
10.1109/CIS.2014.39
Filename
7016964
Link To Document