Many commercial computer environments have established architectures and followed directions which give rise to circumstances which are classified as non-secure in terms of traditional logical security standards. To accommodate increasing demands for security in such environments, a research project was undertaken to analyse them and propose solutions. By using context-sensitive grammars and analysing the structure of computer security models, an alternative was originated. The model is able to accommodate a wide variety of computer environments, accommodates secure environment concepts as a special case and forms a basis for automatic security evaluation and profile generation. A number of case studies illustrate the use of this model in different circumstances including wide area networks, local area networks, multiple executions in single-address spaces and multi domain resource access.
[1]
Rita C. Summers.
An Overview of Computer Security
,
1984,
IBM Syst. J..
[2]
D. Elliott Bell,et al.
Secure Computer System: Unified Exposition and Multics Interpretation
,
1976
.
[3]
Jonathan K. Millen,et al.
Security Kernel validation in practice
,
1976,
CACM.
[4]
Paul A. Karger.
Authentication and discretionary access control in computer networks
,
1986,
Comput. Secur..
[5]
Carl E. Landwehr.
The Best Available Technologies for Computer Security
,
1983,
Computer.
[6]
Dorothy E. Denning,et al.
A lattice model of secure information flow
,
1976,
CACM.