Reading:text, §5 Assignment due: Project progress report, due February 4, 2014;
Homework #2, due February 11, 2014
Bell-LaPadula Model: intuitive, security classifications only
Show level, categories, define clearance and classification
Lattice: poset with ≤ relation reflexive, antisymmetric, transitive; greatest lower bound, least upper bound
Apply lattice
Set of classes SC is a partially ordered set under relation dom with glb (greatest lower bound), lub (least upper bound) operators
Note: dom is reflexive, transitive, antisymmetric
Example: (A, C) dom (A′, C′) iff A ≤ A′ and C ⊆ C′;
lub((A, C), (A′, C′)) = max(A, A′), C ∪ C′); and
glb((A, C), (A′, C′)) = min(A, A′), C ∪ C′)
Simple security condition (no reads up), *-property (no writes down), discretionary security property
Basic Security Theorem: if it is secure and transformations follow these rules, it will remain secure
Maximum, current security level
Bell-LaPadula: formal model
Elements of system: si subjects,
oi objects
State space V = B × M × F ×
H where: B set of current accesses (i.e., access modes each subject has
currently to each object); M access permission matrix; F consists of 3 functions: fs is security level
associated with each subject, fo security level
associated with each object, and fc current security
level for each subject; H hierarchy of system objects, functions h:
O→P(O) with two properties:
If oi ≠ oj, then
h(oi) ∩
h(oi) = ∅
There is no set
{ o1, …, ok } ⊆ O
such that for each i, oi+1
∈ h(oi) and
ok+1 = o1
Set of requests is R
Set of decisions is D
W = R × D × V ×
V is motion from one state to another
System Σ(R, D, W, z0)
⊆ X × Y × Z such that
(x, y, z) ∈ Σ(R,
D, W, z0) iff
(xt, yt,
zt, zt−1)
∈ W for each t ∈ T; latter is an
action of system
Theorem: Σ(R, D, W, z0)
satisfies the simple security condition for any initial state
z0 that satisfies the simple security
condition iff W satisfies the following conditions for
each action (r, d,
(b′, m′, f′,
h′), (b, m, f, h)):
each (s, o, x) ∈
b′ − b satisfies the simple
security condition relative to f′ (i.e.,
x is not read, or x is read and
fs(s) domfo(o)); and
if (s, o, x) ∈ b does not
satisfy the simple security condition relative to
f′, then (s, o, x) ∉
b′
Theorem: Σ(R, D, W, z0)
satisfies the *-property relative to S′ ⊆
S for any initial state z0 that
satisfies the *-property relative to S′ iff
W satisfies the following conditions for each
(r, d, (b′,
m′, f′, h′), (b,
m, f, h)):
for each s ∈ S′, any (s,
o, x) ∈ b′ − b
satisfies the *-property with respect to f′;
and
for each s ∈ S′, if (s,
o, x) ∈ b does not satisfy the
*-property with respect to f′, then
(s, o, x) ∉ b′
Theorem: Σ(R, D, W, z0)
satisfies the ds-property iff the initial state
z0 satisfies the ds-property and W
satisfies the following conditions for each
(r, d, (b′,
m′, f′, h′), (b,
m, f, h)):
if (s, o, x) ∈ b′
− b, then x ∈
m′[s, o]; and
if (s, o, x) ∈ b and
x ∈ m′[s, o], then
(s, o, x) ∉ b′
Basic Security Theorem: A system Σ(R, D,
W, z0) is secure iff z0
is a secure state and W satisfies the conditions of the above
three theorems for each action.