Abstract
In order to develop high security level operating system that applies to trusted computing platform, at the same time to meet the requirements for confidentiality and integrity protection, a novel Duality and Multi-Level Security Model based on Trusted State(DMLSMTS) is proposed in this paper. It protects the confidentiality of information based on BLP model and the integrity based on Biba model. It introduces “trusted measurement function” and uses the mechanism of trusted measurement which is unique in trusted computing platform to estimate the trusted state of subject or object, and based on the evaluation result to call trusted agent to grant the access which validates the BLP model or Biba model. It gives the formal description of the model. Furthermore it proves that the system remains in a secure state after executing the security rules.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, Roseville, Minnesota (June 1997)
Gligor, V.D., Burch, E.L., Chandersekaran, C.S., Chapman, R.S., Dotterer, L.J., Hecht, M.S., Jiang, W.D., Luckenbaugh, G.L., Vasudevan, N.: On the Design and the Implementation of Secure Xenix Workstations. In: Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 102–117 (April 1986)
Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. Technical report, NSA and NAI labs (January 2001)
Bell, D.E., La Padula, L.J.: Secure Computer Systems: Mathematical Foundations. Hanscom AFB, Bedford, MA, Rep.ESD-TR-73-278, vol. 2. ESD/AFSC (1973)
Bell, D.E., La Padula, L.J.: Secure Computer Systems: Mathematical Foundations. Hanscom AFB, Bedford, MA, Rep.ESD-TR-73-278, vol. 2. ESD/AFSC (1973)
Bell, D.E., La Padula, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. MTR-2997 Rev. 1. The MITRE Corporation, Bedford, MA, USA (March 1976)
Lin, T.Y., Bell, D.E., Lapadula, L.J.: Axioms: A “New” Paradigm for an “Old” Model. Paper of the 1992 NSPW (September 1992); Proceedings on the 1992-1993 ACM SIGSAC New Security Paradigms Workshop, Little Compton, Rhode Island, USA, pp. 82–93 (August 1993)
TCG Specification Architecture Overview Specification Revision 1.2 (April 28, 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, W. (2011). A Novel Duality and Multi-Level Security Model Based on Trusted State. In: Qi, L. (eds) Information and Automation. ISIA 2010. Communications in Computer and Information Science, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19853-3_108
Download citation
DOI: https://doi.org/10.1007/978-3-642-19853-3_108
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19852-6
Online ISBN: 978-3-642-19853-3
eBook Packages: Computer ScienceComputer Science (R0)