Analysis and Improvement of the BLP Security Model

Article Preview

Abstract:

Bell-LaPadula model (BLP) model is the most classical multilevel computer security model. Based on the research of BLP model, this paper analyzes the main defects in BLP model and different improving methods, puts forward a principle or “read the nearest and write the nearest”, improves the BLP model more effective security and integrity.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 998-999)

Pages:

578-581

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Bell D E, Leonard J L. Secure Computer System: Unified Expositionand MULTICS Interpretation[R]. Bedford, MA, USA: The MitreCorporation, Tech. Rep.: MTR-2997, (1976).

Google Scholar

[2] L. Cholvy and F. Cuppens. Providing Consistent Views in a Polyinstantiated Database. Eighth Annual Working Conference on Database Security, August (1994).

Google Scholar

[3] Sushil Jajodia and Catherine Meadows, Inference Problems in Multilevel Secure Database Management Systems, Information Security, Essay 24.

Google Scholar

[4] Agrawal R, Evfimievski A, Srikant R. Information Sharing AcrossPrivate Databases, Proceedings of ACM SIGMOD InternationalConference on Management of Data, 2003-06: 86-97.

DOI: 10.1145/872757.872771

Google Scholar

[5] HectorGarcia-Molina, Jeffery D. Uiiman, The Implementation of Database System. Machinery Industry Press. (2001).

Google Scholar

[6] Feng Zhaoyang. Yue Lihua, et al. The key Loophole Problem of the Existing Multilevel Secure Data Model and the Eliminating Method, Computer engineering and Applications, (2005).

Google Scholar

[7] Kantarcioglu M, Clifton C. Privacy-preserving Distributed Miningof Association Rules on Horizontally Partitioned Data, Proc. ofIEEE Transactions on Knowledge and Data Engineering, 2004-09: 1026-1037.

DOI: 10.1109/tkde.2004.45

Google Scholar