[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A high assurance MLS file server

Published: 01 January 2007 Publication History

Abstract

In this paper, we present the design of a high assurance file server model developed to operate within the Multiple Independent Levels of Security framework. The file server model is a multilevel application that utilizes separation to mediate information flow by adhering to a security policy formulated from a modified version of the Bell and LaPadula Model and the GWVr2 policy, which is a separation kernel based policy developed for high assurance architectures. This paper focuses on the design aspects of the file server model and the underlying architecture. The purpose of this file server design is to develop a formal model to meet the formal methods requirement of Common Criteria, which is a system design and specification guideline for high assurance systems. The model is also an example application for the Multiple Independent Levels of Security architecture.

References

[1]
Alves-Foss, J. and Taylor, C. An Analysis of the GWV Security Policy. ACL2 Workshop 2004. Austin, TX, Nov. 2004.
[2]
Alves-Foss, J., Harrison, W. S., Oman, P., and Taylor, C. The MILS Architecture for High Assurance Embedded Systems. In International Journal of Embedded Systems, in press.
[3]
Bell, D. E. and LaPadula, L. Secure Computer System: Unified Exposition and Multix Interpretation. ESD-TR-75-306. Bedford, MA, MITRE Corp., 1976.
[4]
Bertino, E., Jajodia, S., Mancini, L., and Ray, I. Advanced Transaction Processing in Multi-level Secure File Stores, IEEE Transactions on Knowledge and Data Engineering, 10, 1, Jan/Feb 1998.
[5]
Bishop, M. Computer Security: Art and Science, Addison-Wesley Professional, New York, NY, 2003.
[6]
Canadian System Security Centre, Communications Security Establishment, The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC) Version 3.0e, January 1993.
[7]
Commission of the European Communities, Information Technology Security Evaluation Criteria, Version 1.2, June 1991.
[8]
Common Criteria for Information Security Evaluation, Part 1: Introduction and General Model, Draft Version 3.0, Revision 2, CCMB-2005-07-001, June 2005.
[9]
Denning, D. E., Lunt, T. F., Schell, R. R., Shockley, W. R., and Heckman, M. The SeaView Security Model, IEEE Symposium on Security and Privacy, 1988, 218--233.
[10]
Foley, S. N. A Model for Secure Information Flow, IEEE Symposium on Security and Privacy, 1989, 248--258.
[11]
Greve, D., Wilding, M., and Vanfleet, M. V. A Separation Kernel Formal Security Policy. ACL2 Workshop 2003, (Boulder, CO, Jul. 2003).
[12]
Greve, D., Wilding, M., Richards, R., and Vanfleet, M. V. Formalizing Security Policies for Dynamic and Distributed Systems. Sep. 2004.
[13]
Hall, A. Seven Myths of Formal Methods, IEEE Software, 7, 5, Sep./Oct. 1990, 11--19.
[14]
Harrison, W. S., Hanebutte, N., Oman, P., and Alves-Foss, J. The MILS Architecture for a Secure Global Information Grid. In CrossTalk: Journal of Defense Software Engineering, 18, 10, Oct. 2005, 20--25.
[15]
Irvine, C. E. A Multilevel File System for High Assurance. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, CA, May 8--10, 1995). IEEE, 1995, 78--87.
[16]
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., and Fu. K. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proceedings of the Second USENIX Conference on File and Storage Technologies, Mar. 2003, 29--42.
[17]
Landwehr, C., Heitmeyer, C., and McLean, J. A Security Model for Military Message Systems, ACM Transactions on Computer Systems, 2, 3, Aug. 1984, 198--222.
[18]
Li, J., Krohn, M., Mazières, D., and Shasha, D. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, San Francisco, CA, Dec. 2004.
[19]
McLean, J. A Comment on the Basic Security Theorem of Bell and LaPadula, Information Processing Letters, Vol. 20(2), Feb. 1985, 67--70.
[20]
McNamee, D., Heller, S., and Huff, D. Building Multilevel Secure Web Services-Based Components for the Global Information Grid. CrossTalk: Journal of Defense Software Engineering, 19, 5, May 2006, 15--19.
[21]
Richards, R., Greve, D., Wilding, M., and Vanfleet, W. M. The Common Criteria, Formal Methods and ACL2. ACL2 Workshop 2004, (Austin, TX, Nov. 2004).
[22]
Riedel, E., Kallahalla, M., and Swaminathan, R. A framework for evaluating storage system security. In Proceedings of the Conference on File and Storage Technology, Monterey, CA, Jan. 2002, pp. 15--30.
[23]
Rushby, J. Design and verification of secure systems. ACM Operating Systems Principles, Dec. 1981, pp. 12--21.
[24]
Sandhu, R., and Chen, F. The Multi-level Relational (MLR) Database Data Model. ACM Transactions on Information and System Security, 1, 1, Nov. 1998, 93--132.
[25]
Sandhu, R. Relational Database Access Controls, Handbook of Information Security Management (1994-95 Yearbook), Auerbach Publishers, 1994, 145--160.
[26]
United States Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, December 1985.
[27]
Wahsheh, L. A., and Alves-Foss, J. Specifying and Enforcing a Multi-Policy Paradigm for High Assurance Multi-Enclave Systems. Journal of High Speed Networks, 15, 3, Oct. 2006, 315--327.
[28]
Williams, J. C., and Dinolt, G. W. A Formal Model of a Trusted File Server, IEEE Symposium on Security and Privacy, 1989, 157--166.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 41, Issue 1
January 2007
110 pages
ISSN:0163-5980
DOI:10.1145/1228291
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2007
Published in SIGOPS Volume 41, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)3
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Analysis and Improvement of BLP Model for Multi-Level Security DatabaseApplied Mechanics and Materials10.4028/www.scientific.net/AMM.397-400.2536397-400(2536-2539)Online publication date: Sep-2013
  • (2013)In Guards We TrustProceedings of the 2013 International Conference on Social Computing10.1109/SocialCom.2013.87(578-585)Online publication date: 8-Sep-2013
  • (2012)Security Information Flow Control Model and Method in MILSProceedings of the 2012 Eighth International Conference on Computational Intelligence and Security10.1109/CIS.2012.138(591-595)Online publication date: 17-Nov-2012
  • (2007)Implementing middleware for content filtering and information flow controlProceedings of the 2007 ACM workshop on Computer security architecture10.1145/1314466.1314474(47-53)Online publication date: 2-Nov-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media