Trusted subjects are inevitably parts of multi-level security systems or trusted networks. They can introduce security risk into system, as they don't comply with *-property in Bell LaPadula model. It's an important work to determine which subjects are trusted from hundreds and thousands of applications, and what their security requirements are during the developing and deploying secure operating systems. In this paper, an approach is proposed to address these issues based on information flow and risk analysis. Type enforcement specification is used as a base for information flow analysis and then finding out trusted subjects and their security requirements:security label range and security assurance level. © 2011 Springer-Verlag.
CITATION STYLE
Li, S., & He, Y. (2011). Trusted subjects configuration based on TE model in MLS systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6802 LNCS, pp. 98–107). https://doi.org/10.1007/978-3-642-25283-9_7
Mendeley helps you to discover research relevant for your work.