Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The Specification and Modeling of Computer Security
McLean J. Computer23 (1):9-16,1990.Type:Article
Date Reviewed: Oct 1 1990

The Bell and LaPadula definition of security for computer systems has been widely used for some years as the model followed in the National Computer Security Center’s evaluation process for trusted computer systems. This paper addresses the author’s concerns about the limitations of this model and presents proposals for a more refined definition that takes into consideration the ability to change the security level of users and objects and the issue of secure state transitions in addition to the issue of secure states. Along the way, an excellent tutorial discussion about computer security shows clearly how slippery the problems can be in this important field.

This paper is clearly written and achieves its purpose of discussing the limitations of Bell and LaPadula’s definition and presenting alternatives. Everyone involved in the technical aspects of computer security (especially those who have been or are now involved in designing commercial products) should carefully read it.

Reviewer:  Glenn H. MacEwen Review #: CR114559
Bookmark and Share
 
Verification (D.4.6 ... )
 
 
Specification Techniques (F.3.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Verification": Date
Muse--a computer assisted verification system
Halpern J., Owre S., Proctor N., Wilson W. IEEE Transactions on Software Engineering SE-13(2): 151-156, 1987. Type: Article
Dec 1 1987
Digital system verification: a combined formal methods and simulation framework
Li L., Thornton M., Morgan and Claypool Publishers, San Rafael, CA, 2010.  100, Type: Book (978-1-608451-78-4)
Oct 24 2011
 Formal verification of information flow security for a simple ARM-based separation kernel
Dam M., Guanciale R., Khakpour N., Nemati H., Schwarz O.  CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, Nov 4-8, 2013)223-234, 2013. Type: Proceedings
Jan 27 2014
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy