Research on confidential level extended BLP model

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The rule of "No-Down-Write" of BLP model restrict its applying in application system because "Down-Write" is often necessary in real life. A new access control model based on Confidential level extended BLP model was researched because of the conflicts. A range of Confidential level is given to the subjects and a confidential rule set is established to endow the subject with the capability of writing down in a bound when it satisfied the confidential rules. The model enforces MAC. The definitions, security check rules, axioms of the model are illustrated in the paper. The model was applied in a multilevel secure DBMS development. The implementation is introduced in short at last. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Liu, X., Han, Z., Sheng, K. J., & Shen, C. X. (2005). Research on confidential level extended BLP model. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3684 LNAI, pp. 257–262). Springer Verlag. https://doi.org/10.1007/11554028_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free