Skip to main content

A Novel Duality and Multi-Level Security Model Based on Trusted State

  • Conference paper
Information and Automation (ISIA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 86))

Included in the following conference series:

  • 1166 Accesses

Abstract

In order to develop high security level operating system that applies to trusted computing platform, at the same time to meet the requirements for confidentiality and integrity protection, a novel Duality and Multi-Level Security Model based on Trusted State(DMLSMTS) is proposed in this paper. It protects the confidentiality of information based on BLP model and the integrity based on Biba model. It introduces “trusted measurement function” and uses the mechanism of trusted measurement which is unique in trusted computing platform to estimate the trusted state of subject or object, and based on the evaluation result to call trusted agent to grant the access which validates the BLP model or Biba model. It gives the formal description of the model. Furthermore it proves that the system remains in a secure state after executing the security rules.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, Roseville, Minnesota (June 1997)

    Google Scholar 

  2. Gligor, V.D., Burch, E.L., Chandersekaran, C.S., Chapman, R.S., Dotterer, L.J., Hecht, M.S., Jiang, W.D., Luckenbaugh, G.L., Vasudevan, N.: On the Design and the Implementation of Secure Xenix Workstations. In: Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 102–117 (April 1986)

    Google Scholar 

  3. Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. Technical report, NSA and NAI labs (January 2001)

    Google Scholar 

  4. Bell, D.E., La Padula, L.J.: Secure Computer Systems: Mathematical Foundations. Hanscom AFB, Bedford, MA, Rep.ESD-TR-73-278, vol. 2. ESD/AFSC (1973)

    Google Scholar 

  5. Bell, D.E., La Padula, L.J.: Secure Computer Systems: Mathematical Foundations. Hanscom AFB, Bedford, MA, Rep.ESD-TR-73-278, vol. 2. ESD/AFSC (1973)

    Google Scholar 

  6. Bell, D.E., La Padula, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. MTR-2997 Rev. 1. The MITRE Corporation, Bedford, MA, USA (March 1976)

    Google Scholar 

  7. Lin, T.Y., Bell, D.E., Lapadula, L.J.: Axioms: A “New” Paradigm for an “Old” Model. Paper of the 1992 NSPW (September 1992); Proceedings on the 1992-1993 ACM SIGSAC New Security Paradigms Workshop, Little Compton, Rhode Island, USA, pp. 82–93 (August 1993)

    Google Scholar 

  8. TCG Specification Architecture Overview Specification Revision 1.2 (April 28, 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, W. (2011). A Novel Duality and Multi-Level Security Model Based on Trusted State. In: Qi, L. (eds) Information and Automation. ISIA 2010. Communications in Computer and Information Science, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19853-3_108

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19853-3_108

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19852-6

  • Online ISBN: 978-3-642-19853-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics