Comparison and Evaluation of Information Security Models for Access Control

Article Preview

Abstract:

This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

708-712

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] P. Allo, B. Baumgaertner, S. D'Alfonso, N. Fresco, F. Gobbo, C. Grubaugh, A. Iliadis, P. Illari, E. Kerr, G. Primiero, F. Russo, C. Schulz, M. Taddeo, M. Turilli, O. Vakarelov, H. Zenil, The Philosophy of Information, available at: http: /socphilinfo. org/sites/default/files/i2pi_2013. pdf accessed: 05. 01. (2014).

Google Scholar

[2] M. Bishop, Computer Security: Art and Science, Addison Wesley, Boston, (2003).

Google Scholar

[3] S. Popa Security of informatics systems-lectures and applications (in Romanian), Alma Mater Publishing, Bacău, (2007).

Google Scholar

[4] C. Pfleeger, Security in Computing, Prentice Hall, (2003).

Google Scholar

[5] L. J. LaPadula, The Basic Security Theorem of Bell and LaPadula Revisited, Cipher, (1989).

Google Scholar

[6] RFC 1457. Security Label Framework for the Internet, available at http: /www. ietf. org/rfc/rfc1457. txt accessed: 05. 01. (2014).

Google Scholar

[7] I. Sutherland, Relating Bell-LaPadula-Style Security Models to Information Models, Proceedings of the Computer Security Foundations Workshop, Franconia, N.H., 1988, pp.112-126.

Google Scholar

[8] D. Bell and L. LaPadula. Secure computer system: Unified exposition and Multics interpretation. 1976, available at: http: /csrc. nist. gov/publications/history/bell76. pdf accessed: 05. 01. (2014).

DOI: 10.21236/ada023588

Google Scholar

[9] D. Denning, The Limits of Formal Security Models, 1999, available at: http: /faculty. nps. edu/dedennin/publications/National%20Computer%20Systems%20Security%20Award%20Speech. htm accessed: 05. 01. (2014).

Google Scholar