Computer and Network Security
Trusted Operating Systems
- R. E. Newman
Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu
Computer and Network Security Trusted Operating Systems R. E. - - PDF document
Computer and Network Security Trusted Operating Systems R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu Trusted Operating Systems (Pfleeger Ch. 7)
Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@cise.ufl.edu
1
2
3
4
5
6
7
Lattice S, < is a partially ordered set (poset) S with partial order < (transitive and antisymmetric) such that for any s1, s2 ∈ S, there exists
s1 < u and s2 < u, and for all u′ where s1, s2 < u′,u < u′;
l < s1, l < s2 and for all l′ where l′ < s1,s2, l′ < l; 8
Figure 1: A non-linear lattice
Used for confidentiality of information
Used for integrity of information
9
Figure 2: A linear lattice
I(o) ≥ I(p) 10
Figure 3: A simple example MLS lattice with labels 11
12
– If single operation per command, then decidable – Otherwise, not decidable 13
14
15
16
17
18
19
20
21
22
(a) D: Minimal Protection (b) C: Discretionary Protection
(c) B: Mandatory Protection
(d) A: Verified Protection
(e)
23
databases
assurance
24
25
26
27
28