This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 12/19/2010 1 Unit 5: Multilevel Security Unit 5: Multilevel Security Part 2 Click Here to Start Audio Anderson Report Anderson Report c Anderson, J.P “Computer Security Technology and Planning Study”, ESD- TR-73-51, Air Force 1972 c Introduced ◦ Reference Monitors C Tamperproof, Always Invoked, Small ◦ Formal Verification Landmark Formal Model Landmark Formal Model c Written in ‘70’s at MITRE ◦ Air Force Contract ◦ Bell, D.E and LaPadula, L.J “Secure Computer Systems: Unified Exposition and Multics Interpretation”, MTR-2997, 1976 c Very Influential Impact on TCSEC c Includes Discretionary Rules (ds- property) 12/19/2010 2 Basic Security Theorem Basic Security Theorem c Inductive Security ◦ Secure State ◦ Rules Proven to Preserve Secure State ◦ Will Always Stay in a Secure State c Examples of Non-Inductive Problems ◦ Resource Deadlock State State-Based Models Based Models c “Building A Secure Computer System” Morrie Gasser ◦ Define Security-Relevant Objects...
View Full Document
- Spring '11
- Computer Security, security levels, Multilevel security, Secure State