DocumentCode
2561447
Title
Comparison Paper between the Bell and LaPadula Model
Author
Taylor, Tad
Author_Institution
DoD Computer Security Center
fYear
1984
fDate
April 29 1984-May 2 1984
Firstpage
195
Lastpage
195
Abstract
This paper provides a brief explanation of the two most cited models in the field of computer security and points out the basic differences between them. There ia a common misconception in the field that the MLS tool for HDM is designed to be an implementation of the Bell and LaPadula model. In fact, the MLS tool is an implementation of a model that resembles Bell and LaPadula in some aspects but is different in many, very important ways. Furthermore, this paper makea a plea for the community to be more precise in their usage of terms from the models and to identify the model with which they´re dealing.
Keywords
Abstracts; Computational modeling; Computer security; Computers; Mathematical model; US Department of Defense;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1984 IEEE Symposium on
Conference_Location
Oakland, CA, USA
ISSN
1540-7993
Print_ISBN
0-8186-0532-4
Type
conf
DOI
10.1109/SP.1984.10021
Filename
6234798
Link To Document