Filters








13,544 Hits in 2.7 sec

Proving multilevel security of a system design

R. J. Feiertag, K. N. Levitt, L. Robinson
1977 Proceedings of the sixth symposium on Operating systems principles - SOSP '77  
The two models when applied appropriately are more useful for defining and proving the multilevel security of systems than existing models.  ...  The less general model relates well to design specifications and permits straightforward proof of the security of a system design. The correspondence between the two models is easily demonstrated.  ...  Ken Shotting has provided many valuable comments regarding the security principles presented in the paper.  ... 
doi:10.1145/800214.806547 dblp:conf/sosp/FeiertagLR77 fatcat:oi4qwkdmtrcq3o22j2fbqt3w5y

Reflections on the verification of the security of an operating system kernel

Jonathan M. Silverman
1983 Proceedings of the ninth ACM symposium on Operating systems principles - SOSP '83  
This paper discusses the formal verification of the design of an operating system kernel's conformance to the multilevel security property.  ...  First, it is for a complete implementation of a commercially available secure computer system.  ...  APPENDIX A SUMMARY OF KSOS-6 PROOF OF SECURITYTable A-I summarizes the results of the proof of the multilevel security property for the design of the KSOS-6 kernel.  ... 
doi:10.1145/800217.806623 dblp:conf/sosp/Silverman83 fatcat:vdjp2feqdfanrfy4syvuprbl7i

Reflections on the verification of the security of an operating system kernel

Jonathan M. Silverman
1983 ACM SIGOPS Operating Systems Review  
This paper discusses the formal verification of the design of an operating system kernel's conformance to the multilevel security property.  ...  First, it is for a complete implementation of a commercially available secure computer system.  ...  APPENDIX A SUMMARY OF KSOS-6 PROOF OF SECURITYTable A-I summarizes the results of the proof of the multilevel security property for the design of the KSOS-6 kernel.  ... 
doi:10.1145/773379.806623 fatcat:ztlv4o26rvdenfp7fkhmuwyxxu

Multilevel Security Network Communication Model Based on Multidimensional Control

Lifeng Cao, Xin Lu, Zhensheng Gao, Mengda Han, Xuehui Du
2020 Mathematical Problems in Engineering  
Thus, secure information exchange within a multilevel security network information system is ensured.  ...  To solve the problems associated with the application of multilevel security to actual networks, such as flexibility, availability, security, and secure communication, this study proposes a multilevel  ...  Furthermore, some studies [27] [28] [29] provided an effective guidance for using the noninterference theory to prove the security of a multilevel security model.  ... 
doi:10.1155/2020/3528439 fatcat:5dges5y4mnhqfoujebkwuelnqy

Multilevel Cryptography with Metadata and Lock Approach for Storing Data in Cloud

Dinesha Hagare Annappaian, Vinod Kumar Agrawal
2014 Transactions on Networks and Communications  
The security architecture of the system is designed by using DES cipher block chaining, which eliminates the fraud that occurs today with stolen data.  ...  In this paper we present the multilevel cryptography algorithm for secure cloud data storage with design and analysis.  ...  Shylaja S S, HOD, Department of Information Science and Engineering, PES University, Bangalore, for their constant encouragement.  ... 
doi:10.14738/tnc.26.591 fatcat:2xbiprnadvfa7b2ooc3wo3oegq

Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT

Jian Dong, Hui Zhu, Chao Song, Qiang Li, Rui Xiao
2018 Wireless Communications and Mobile Computing  
Based on Bell-LaPadula Model (BLP), a task-oriented multilevel cooperative access control scheme virtualization and reality BLP, named VR-BLP, is proposed.  ...  However, there are many severe challenges on the security of virtual machines and IoT terminals.  ...  A BLP-based multilevel security model [18] for private cloud was proposed and was proved secure by mathematical method.  ... 
doi:10.1155/2018/5938152 fatcat:xiopixe4bvdwxaagim5npkrxje

Secure Database Development [chapter]

Jan Jurjens, Eduardo B. Fernandez
2014 Encyclopedia of Database Systems  
For the database community the words secure database design may refer to the schema design to produce a database for a specific application with some level of security properties.  ...  In particular, it describes how to build a general-purpose database management system where security is an important design parameter.  ...  Here the DBMS and the operating system have their own set of security services. • Figure 2 shows a way to unify the design of the DBMS with the design of the OS, using an I/O and file subsystem and a  ... 
doi:10.1007/978-1-4899-7993-3_329-2 fatcat:ybhrxoe46rebxakmfby4xdwwcq

Gate-Level Information Flow Tracking for Security Lattices

Wei Hu, Dejun Mu, Jason Oberg, Baolei Mao, Mohit Tiwari, Timothy Sherwood, Ryan Kastner
2014 ACM Transactions on Design Automation of Electronic Systems  
created in a constructive manner, and illustrates application scenarios of GLIFT for enforcing multilevel information flow security.  ...  This article provides a general way to expand the GLIFT method for multilevel security.  ...  -Providing a general way to expand GLIFT for MLS. We provide an approach to expand the GLIFT method to target arbitrary levels of security labels for proving multilevel security.  ... 
doi:10.1145/2676548 fatcat:stewdpqapzbi7jgvbgos3eqtme

Multilevel security issues in distributed database management systems

John McHugh, Bhavani M. Thuraisingham
1988 Computers & security  
This paper describes the security needs in a distributed processing environment common to many enterprises and discusses the applicability of multilevel secure database management systems in such an environment  ...  Such a policy is called a multilevel security policy and a system which enforces one is said to be multilevel secure.  ...  In order to prove that the TCB is complete and correct, a mathematical model of the system and its security policy is developed and formal verification methods are used to show that the system design satisfies  ... 
doi:10.1016/0167-4048(88)90579-2 fatcat:v7oueqowofgqdd3rp4455qpyhy

Comparison Paper between the Bell and LaPadula Model

Tad Taylor
1984 1984 IEEE Symposium on Security and Privacy  
This paper provides a brief explanation of the two most cited models in the field of computer security and points out the basic differences between them.  ...  There ia a common misconception in the field that the MLS tool for HDM ia designed to be an implementation of the Bell and LaPadula model.  ...  The model ia designed to enforce multilevel security and, optionally, discretionary security within the domain of a computer system.  ... 
doi:10.1109/sp.1984.10021 dblp:conf/sp/Taylor84 fatcat:urnktgxa4jbvtg27iyjy5mxogi

Design and verification of secure systems

J. M. Rushby
1981 ACM SIGOPS Operating Systems Review  
The purpose of a security kernel is simply to allow such a 'distributed' system to actually run within a single processor; policy enforcement is not the concern of a security kernel.  ...  It is proposed that secure systems should be conceived as distributed systems in which security is achieved partly through the physical separation of their individual components and partly through the  ...  These are the formal statements of the six conditions for Proof of Separability.  ... 
doi:10.1145/1067627.806586 fatcat:y3t5ocwsyrdodcyjmgnvavyiuy

Design and verification of secure systems

J. M. Rushby
1981 Proceedings of the eighth symposium on Operating systems principles - SOSP '81  
The purpose of a security kernel is simply to allow such a 'distributed' system to actually run within a single processor; policy enforcement is not the concern of a security kernel.  ...  It is proposed that secure systems should be conceived as distributed systems in which security is achieved partly through the physical separation of their individual components and partly through the  ...  These are the formal statements of the six conditions for Proof of Separability.  ... 
doi:10.1145/800216.806586 dblp:conf/sosp/Rushby81 fatcat:cdv2zrboojhirjd5kkmjitxqge

Applications for multilevel secure operating systems

JOHN P. L. WOODWARD
1979 1979 International Workshop on Managing Requirements Knowledge (MARK)  
Now that verifiably secure minicomputer operating systems are becoming a reality, applications for secure systems are becoming more clearly thought-out, designed and implemented.  ...  INTRODUCTION The need for secure computer systems has been identified in many areas of 000 operations, but in the past these systems have not been built in a secure manner because a secure operating system  ...  in terms of secure system states, proving that security is preserved in moving from state to state.  ... 
doi:10.1109/mark.1979.8817315 fatcat:nlu27t5yqzfmpne2a65at6ok4i

Multilevel Security Framework Based Resource Sharing Using Bilinear Mapping in Cloud Environment

Balamanigandan Ramachandran, Kamalraj Subramaniam
2017 International Journal of Intelligent Engineering and Systems  
The result of multilevel security framework is comparatively better than the present day cloud security.  ...  To solve these security issues, in this paper we define a new approach for data sharing issues and service management of Trusted Third Party Authentication ( TPA ) based on multilevel security framework  ...  Multilevel security framework Multilevel security framework is specially designed for improving the security of public cloud environment.  ... 
doi:10.22266/ijies2017.0630.39 fatcat:5n7dbzbarvh3tnhpgg3yrhm5ay

ENHANCING THE SECURITY OF IOT DATA USING MULTILEVEL ENCRYPTION

A.Vithya Vijayalakshmi
2017 International Journal of Advanced Research in Computer Science  
Therefore this paper proposes a multilevel encryption technique to enhance the security of the IoT data.  ...  Internet of Things (IoT) plays a vital role in the field of Information Technology, Industries and Healthcare etc.  ...  Acknowledgements This research was supported by a grant from University Grants Commission (UGC) awarded to A. Vithya Vijayalakshmi under Junior Research Fellowship.  ... 
doi:10.26483/ijarcs.v8i9.4959 fatcat:c2v4a3smdnfu7g2ks67cakk3b4
« Previous Showing results 1 — 15 out of 13,544 results