LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Zhao, Gansen; Chadwick, David W. (2008)
Publisher: IEEE
Languages: English
Types: Unknown
Subjects: QA76

Classified by OpenAIRE into

ACM Ref: Software_OPERATINGSYSTEMS, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely accepted in military environments for its capability to specify military style confidentiality policies. The role based access control (RBAC) model has attracted extensive research effort and has been acknowledged as a flexible and policy natural model. This paper investigates a way of modeling Bell-LaPadula security policies using the RBAC model. The capability of modeling Bell-LaPadula security policies using RBAC model means that applications that are implemented using the RBAC model can then be deployed in military environments and will meet their requirements for information confidentiality.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] American National Standards Institute, Inc. Role-Based Access Control. ANSI INCITS 359-2004., February 2004.
    • [2] D. E. Bell and L. J. LaPadula. Computer security model: Unified exposition and multics interpretation. Technical report, MITRE Corp., Bedford, MA, Tech. Rep. ESD-TR-75- 306, June 1975.
    • [3] D.W.Chadwick, A. Otenko, and E.Ball. Implementing role based access controls using X.509 attribute certificates. IEEE Internet Computing, pages 62-29, March 2003.
    • [4] D. Ferraiolo and R. Kuhn. Role-based Access Control. In Proceedings of 15th National Computer Security Conference, pages 554-563, 1992.
    • [5] S. Gavrila and J. Barkley. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. In Third ACM Workshop on Role-Based Access Control, pages 81 - 90, 1998.
    • [6] M. Nyanchama and S. Osborn. Modeling mandatory access control in role-based security systems. In Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects, pages 129 - 144, 1996.
    • [7] R. Oppliger, G. Pernul, and C. Strauss. Using attribute certificates to implement role-based authorization and access controls. In S. T. K. Bauknecht, editor, Sicherheit in Informationssystemen (SIS 2000), pages 169-184, Zurich, 2000.
    • [8] R. Sandhu, D. Ferraiolo, and R. Kuhn. The NIST Model for Role Based Access Control: Towards a Unified Standard. In 5th ACM Workshop on Role Based Access Control, pages 47-63, July 2000.
    • [9] R. S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, 1993.
    • [10] R. S. Sandhu. Role hierarchies and constraints for latticebased access controls. In ESORICS '96: Proceedings of the 4th European Symposium on Research in Computer Security, pages 65-79, London, UK, 1996. Springer-Verlag.
    • [11] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article