Strict Integrity Policy of Biba Model with Dynamic Characteristics and its Correctness

Strict Integrity Policy (SIP) of Biba model can maintain the integrity of data in computer systems, but it might deny some non-malicious access requests of subjects and hence decreases the compatibility of applications. An improved SIP with dynamic characteristics is presented, which can increase the compatibility of the software while keeping the integrity as well as SIP can. And the proof is also given, which shows that the improved SIP is secure.

[1]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[2]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[3]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[4]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[5]  Daniel F. Sterne,et al.  A Domain and Type Enforcement UNIX Prototype , 1995, Comput. Syst..

[6]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[7]  Zhang Xiangfeng and Sun Yufang Dynamic Enforcement of the Strict Integrity Policy in Biba's Model , 2005 .

[8]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.