An Access Control Mode Based on Information Flow Graph

Due to different class systems make access decision independently, in the cross class information system (Cross-Class-IS), the privilege may be out of control and the security policies may not be coincident. It is huge risk especially to the higher class system. Now, the system normally checks the security of the access between subject and object. But it cannot protect the indirect information caused by access cross class and domain. This article proposes an access control model, which can be used to analyze the security in Cross-Class-IS.

[1]  Zhangxi Tan,et al.  An authentication model for multilevel security domains , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[2]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[3]  Len LaPadula,et al.  Secure Computer Systems: A Mathematical Model , 1996 .

[4]  Li Rui A BLP Model Based on Access History , 2006 .

[5]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[6]  Cai Yi A Planar Attributes Model Based on Multi Level Security Policy , 2004 .

[7]  L.,et al.  SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .