Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A Hookup Theorem for Multilevel Security
McCullough D. IEEE Transactions on Software Engineering16 (6):563-568,1990.Type:Article
Date Reviewed: Apr 1 1991

Some designers of multilevel secure systems have been assuming that given two systems that individually have the deducibility security property, their composition has this property. McCullough presents a counterexample to this conjecture and introduces a significant new approach in the theory of multilevel security. He gives a valid but poorly presented counterexample showing two systems, each having the deducibility security property, whose composition does not have the deducibility security property.

As a replacement for deducibility security, the author introduces the concept of restrictiveness. He defines this concept in terms of a special class of input total state machines called restrictive state machines. The following theorem is stated and proven: “If state machines A and B are restrictive, then a composite machine formed from hooking them up is restrictive.” The proof contains several typographic errors, and at least one assumption is missing. The reader willing to accept the results at face value will find the counterexample and the definition of a restrictive state machine to be of value. For readers who wish to understand the basis for the results presented, the counterexample presentation may be frustrating and repairing the typographic errors in the proof will be a nuisance, but they should find the paper worthwhile. The paper would have benefitted greatly from a careful explanation of the counterexample, elimination of the typographic errors, and repair of the omissions in the proof.

Reviewer:  T. S. Arnold Review #: CR124304
Bookmark and Share
 
Information Flow Controls (D.4.6 ... )
 
 
Access Controls (D.4.6 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Information Flow Controls": Date
Protecting privacy using the decentralized label model
Myers A., Liskov B. ACM Transactions on Software Engineering and Methodology 9(4): 410-442, 2000. Type: Article
Apr 1 2001
Buffer overflow and format string overflow vulnerabilities
Lhee K., Chapin S. Software--Practice & Experience 33(5): 423-460, 2003. Type: Article
Aug 4 2003
Forensic discovery
Farmer D., Venema W., Addison Wesley Professional, 2004. Type: Book (9780201634976)
May 3 2005
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy