Looking back at the Bell-La Padula model

The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identified and elucidated security principles that endure today. This paper reviews those security principles, first in their own time, and then in the context of today's computer and network environment

[1]  Len LaPadula,et al.  Secure Computer Systems: A Mathematical Model , 1996 .

[2]  K. G. Walter,et al.  Primitive Models for Computer Security , 1974 .

[3]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[4]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[5]  C. Weissman BLACKER: security for the DDN examples of A1 security engineering trades , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  P. A. Karger,et al.  Multics security evaluation: vulnerability analysis , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[7]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[8]  Elliott I. Organick,et al.  The multics system: an examination of its structure , 1972 .

[9]  Paul A. Karger,et al.  Thirty years later: lessons from the Multics security evaluation , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[10]  D. Elliott Bell Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .

[11]  Theodore M. P. Lee,et al.  Using mandatory integrity to enforce 'commercial' security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[12]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[13]  E. J. McCauley,et al.  KSOS - The design of a secure operating system , 1899 .

[14]  Clifford Stoll,et al.  The Cuckoo's Egg , 1989 .

[15]  K. Thompson Reflections on trusting trust , 1984, CACM.

[16]  Carrie Fisher Postcards from the Edge , 1987 .

[17]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[18]  Cynthia E. Irvine,et al.  Subversion as a Threat in Information Warfare , 2004 .

[19]  D. E. Bell,et al.  A Software Validation Technique for Certification: The Methodology , 1975 .

[20]  Jerome H. Saltzer,et al.  Protection and the control of information sharing in multics , 1974, CACM.

[21]  Marvin Schaefer,et al.  Program confinement in KVM/370 , 1977, ACM '77.

[22]  Dorothy E. Denning,et al.  A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.

[23]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[24]  Mary Ellen Zurko,et al.  A VMM security kernel for the VAX architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.