Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Mandatory Access Control

  • Bhavani ThuraisinghamEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_214


Multilevel security


As stated in [1], “in computer security, ‘mandatory access control (MAC)’ refers to a kind of access control defined by the National Computer Security Centers Trusted Computer System Evaluation Criteria (TCSEC) as a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity.” With operating systems, the subjects are processes and objects are files. The goal is to ensure that when a subject accesses a file, no unauthorized information is leaked.

Key Point

MAC Models: MAC models were developed initially for secure operating systems mainly in the 1970s and early 1980s, and started with the Bell and La Padula security model. This model has two properties: the simple security property and the *-property (pronounced the star property). The simple security property states that...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
  2. 2.
    Bell D, LaPadula L. “Secure Computer Systems: Mathematical Foundations and Model,” M74-244. Bedford: The MITRE Corporation; 1973.Google Scholar
  3. 3.
    Goguen J, Meseguer J. Security policies and security models. In: Proceedings of the IEEE Symposium on Security and Privacy; 1982. p. 11–20.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.The University of Texas at DallasRichardsonUSA

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DiSTAUniv. of InsubriaVareseItaly