Publication | Closed Access
Lattice-based access control models
708
Citations
9
References
1993
Year
Access Control ModelsSecurity ModellingEngineeringSecurity ManagementLogical Access ControlInformation SecurityMilitary LatticeAccess ControlFormal MethodsSecuritySystems EngineeringNetworked Computer SystemsData PrivacyChinese Wall LatticeComputer ScienceComputer Security ModelData Security
Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information. In the late 1970s and early 1980s, researchers applied these models to certain integrity concerns. Later, application of the models to the Chinese Wall policy, a confidentiality policy unique to the commercial sector, was demonstrated. A balanced perspective on lattice-based access control models is provided. Information flow policies, the military lattice, access control models, the Bell-LaPadula model, the Biba model and duality, and the Chinese Wall lattice are reviewed. The limitations of the models are identified.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
| Year | Citations | |
|---|---|---|
Page 1
Page 1