Concerning 'modeling' of computer security

The author examines the notion of modeling, first as it applies to physical sciences, and then with reference to computer security. He identifies two undesirable aspects of models in general, which he calls incompleteness and inapplicability. A model of security given by D.E. Bell and L.J. La Padula (1975) is examined in light of the criticism that a model is a definition of that which it models; the author suggests that the critic's definition of the terms 'model' and 'security' is too wide.<<ETX>>

[1]  M. Newman,et al.  Topics in Algebra , 1978 .

[2]  Richard A. Kemmerer,et al.  Specification and verification of the UCLA Unix security kernel , 1979, CACM.

[3]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[4]  G. Birkhoff,et al.  A survey of modern algebra , 1942 .

[5]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[6]  Butler W. Lampson,et al.  Dynamic protection structures , 1899, AFIPS '69 (Fall).

[7]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[8]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[9]  Gerald J. Popek,et al.  A model for verification of data security in operating systems , 1978, CACM.

[10]  D. Elliott Bell Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .

[11]  Lance Joel Hoffman,et al.  The formulary model for access control and privacy in computer systems , 2018 .

[12]  Carl E. Landwehr,et al.  A Formal Statement of the MMS Security Model , 1984, 1984 IEEE Symposium on Security and Privacy.

[13]  John McLean,et al.  Reasoning About Security Models , 1987, 1987 IEEE Symposium on Security and Privacy.

[14]  R. Leighton,et al.  Feynman Lectures on Physics , 1971 .

[15]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[16]  Clark Weissman,et al.  Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).

[17]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[18]  Ernest Nagel,et al.  Gödel's Proof , 1958 .