In this paper, we extend previous results [1] in the protection and administration of information networks under partial orderings. We summarize previous results, and extend them to cover hierarchical networks. We consider distributed hierarchical administration, show a hierarchical network, and demonstrate a provably secure communications technique in which partial orderings are used to control flow, traffic analysis is minimized, local compromise does not cause global compromise, and distributed hierarchical administration works. We show means by which trusted and untrusted computing bases may be connected to form provably secure distributed information networks under partial orderings, and a risk analysis technique which takes advantage of the POset structure to reduce the complexity of analysis for these networks. We summarize results and propose further extensions of this work.
[1]
David A. Bell,et al.
Secure computer systems: mathematical foundations and model
,
1973
.
[2]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[3]
Fred Cohe.
Protection and administration of information networks with partial orderings
,
1987,
Comput. Secur..
[4]
Fred Cohen,et al.
Computer viruses—theory and experiments
,
1990
.
[5]
K J Biba,et al.
Integrity Considerations for Secure Computer Systems
,
1977
.
[6]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[7]
Fred Cohen.
A secure computer network design
,
1985,
Comput. Secur..