70 likes | 223 Views
Bell-LaPadula Abstract formal treatment of Department of Defense security policy Defines notion (concept) of secure state Defines fundamental modes of access Rules for giving subjects access to objects. Bell-LaPadula. Layer of higher secrecy. Reading Secrets. Reading Secrets. X. X.
E N D
Bell-LaPadula • Abstract formal treatment of Department of Defense security policy • Defines notion (concept) of secure state • Defines fundamental modes of access • Rules for giving subjects access to objects
Bell-LaPadula Layer of higher secrecy Reading Secrets Reading Secrets X X 3. READ/WRITE 2. WRITE 1. READ Divulging Secrets Divulging Secrets X X Layer of lower secrecy 2. Star Property 3. Strong Star Property 1. Simple Security Property
Biba • First to address integrity in computer systems • Based on hierarchical lattice of integrity levels • Elements • Set of subjects (Active, information processing) • Set of objects (Passive, information repository) • Addresses first goal of integrity • Prevent unauthorized users from making modifications
Mathematical dual of confidentiality policy • Access tuple: subject & object • Strict integrity policy • Simple integrity condition • Subject cannot observe (read) objects of lesser integrity • Integrity *-property • Subject cannot modify (write to) objects of higher integrity • Invocation property • Subject cannot send messages (logical request for service) to subjects of higher integrity
BIBA Layer of higher accuracy Contamination X 2. WRITE 1. READ Get Contaminated X Layer of lower accuracy 2. Integrity Star Property 1. Simple Integrity Property
Clark & Wilson • Addresses all 3 integrity goals • Preventing unauthorized users from making modifications • Preventing authorized from making improper modifications • Maintaining internal & external consistency • Well-formed transaction • Preserve/ensure internal consistency • User can manipulate data only in ways that ensure internal consistency
Separation of duty • Attempts ensure external consistency & third goal • Operation divided into sub parts • Different person executes each part • Ensures external consistency (data represents real world) • Prevents authorized users from unauthorized modifications • Access triple • Subject-program-object • Enforced by subject (user)-to-program & program-to-object (data) binding • First integrity goal & separation of duties