DocumentCode :
3088328
Title :
Security model for resource availability - subject and object type enforcement
Author :
Hedenstad, Ole-Erik
Author_Institution :
Norwegian Defence Res. Establ., Kjeller, Norway
fYear :
2009
fDate :
18-21 Oct. 2009
Firstpage :
1
Lastpage :
7
Abstract :
Confidentiality, integrity and availability are the three basic aspects of information security. The purpose of the paper is to refine the availability dimension. In the context of security an object is the passive entity to be protected. "Object" can refer to both an information object and to a resource, e.g. the program (or service) that retrieves the information and enables access to it. Thus, we make a distinction between information and resource availability. We propose a new security model for resource availability called "subject and object type enforcement" (SOTE). The model can express policies for information flow between resources of different administrative domains. It controls the types of resources that are allowed to interact. The ability to express the security requirements and conditions a resource must fulfill, is also part of the model. SOTE is a variation of type enforcement. The main difference is that SOTE is a model for information flow control instead of operating system access control. Type enforcement is well suited for restricting information flows. In particular type enforcements can express intransitive (indirect) information flows. The SOTE model can express such information flow policies at a fine-grained level. This is a prerequisite for flexible and secure information flow in heterogeneous environment where the domains do not implement the same set of security policies and security levels. We also describe how multiple security models can be combined in order to express a composite security policy for information flow. We combine the classic multilevel security models (Bell-LaPadula and Biba) with the SOTE resource availability model.
Keywords :
data integrity; resource allocation; security of data; Bell-LaPadula security model; Biba security model; SOTE model; information availability; information flow control; information security model; object type enforcement; resource availability; subject type enforcement; Access control; Availability; Computer security; Information retrieval; Information security; Multidimensional systems; Multilevel systems; Operating systems; Protection; Unified modeling language;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2009. MILCOM 2009. IEEE
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4244-5238-5
Electronic_ISBN :
978-1-4244-5239-2
Type :
conf
DOI :
10.1109/MILCOM.2009.5380077
Filename :
5380077
Link To Document :
بازگشت