Unit 5-2 Multilevel Security [Compatibility Mode]

Unit 5-2 Multilevel Security [Compatibility Mode] - 1 Unit...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 12/19/2010 1 Unit 5: Multilevel Security Unit 5: Multilevel Security Part 2 Click Here to Start Audio Anderson Report Anderson Report c Anderson, J.P “Computer Security Technology and Planning Study”, ESD- TR-73-51, Air Force 1972 c Introduced ◦ Reference Monitors C Tamperproof, Always Invoked, Small ◦ Formal Verification Landmark Formal Model Landmark Formal Model c Written in ‘70’s at MITRE ◦ Air Force Contract ◦ Bell, D.E and LaPadula, L.J “Secure Computer Systems: Unified Exposition and Multics Interpretation”, MTR-2997, 1976 c Very Influential Impact on TCSEC c Includes Discretionary Rules (ds- property) 12/19/2010 2 Basic Security Theorem Basic Security Theorem c Inductive Security ◦ Secure State ◦ Rules Proven to Preserve Secure State ◦ Will Always Stay in a Secure State c Examples of Non-Inductive Problems ◦ Resource Deadlock State State-Based Models Based Models c “Building A Secure Computer System” Morrie Gasser ◦ Define Security-Relevant Objects...
View Full Document

Page1 / 6

Unit 5-2 Multilevel Security [Compatibility Mode] - 1 Unit...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online