Reading: §4.7, 5.1–5.2, 30 Due: Homework #2, due April 26, 2013
Secure, precise
Observability postulate
Theorem: for any program p and policy c, there is a secure, precise mechanism m* such that, for all security mechanisms m associated with p and c, m* ≈ m
Theorem: There is no effective procedure that determines a maximally precise, secure mechanism for any policy and program
Bell-LaPadula Model: intuitive, security classifications only
Show level, categories, define clearance and classification
Lattice: poset with ≤ relation reflexive, antisymmetric, transitive; greatest lower bound, least upper bound
Apply lattice
Set of classes SC is a partially ordered set under relation dom with glb (greatest lower bound), lub (least upper bound) operators
dom is reflexive, transitive, antisymmetric
(A, C) dom (A′, C′) iff A ≤ A′ and C ⊆ C′; lub((A, C), (A′, C′)) = (max(A, A′), C ∪ C′, glb((A, C), (A′, C′)) = (min(A, A′), C ∩ C′
Simple security condition (no reads up), *-property (no writes down), discretionary security property
Basic Security Theorem: if system is secure and transformations follow these rules, system will remain secure
Maximum, current security level
Bell-LaPadula: formal model
Elements of system: si subjects, oi objects
State space V = B × M × F × H where: B set of current accesses (i.e., access modes each subject has currently to each object); M access permission matrix; F consists of 3 functions: fs is security level associated with each subject, fo security level associated with each object, and fc current security level for each subject; H hierarchy of system objects, functions h : O → P(O) with two properties:
If oi ≠ oj, then h(oi) ∩ h(oj) = ∅
There is no set { o1, …, ok } ⊆ O such that for each i, oi+1 ∈ h(oi) and ok+1 = o1.
Set of requests is R
Set of decisions is D
W ⊆ R × D × V × V is motion from one state to another.
System Σ(R, D, W, z0) ⊆ X × Y × Z such that (x, y, z) ∈ Σ(R, D, W, z0) iff (xt, yt, zt, zt−1) ∈ W for each t ∈ T; latter is an action of system
Theorem: Σ(R, D, W, z0) satisfies the simple security condition for any initial state z0 that satisfies the simple security condition iff W satisfies the following conditions for each action (ri, di, (b′, m′, f′, h′), (b, m, f, h)):
each (s, o, x) ∈ b′−b satisfies the simple security condition relative to f′ (i.e., x is not read, or x is read and fs(s) dom fo(o); and
if (s, o, x) ∈ b does not satisfy the simple security condition relative to f′, then (s, o, x) ≠ b′
Theorem: Σ(R, D, W, z0) satisfies the *-property relative to S′ ⊆ S for any initial state z0 that satisfies the *-property relative to S′ iff W satisfies the following conditions for each (ri, di, (b′, m′, f′, h′), (b, m, f, h)):
for each s ∈ S′, any (s, o, x) ∈ b′−b satisfies the *-property with respect to f′; and
for each s ∈ S′, if (s, o, x) ∈ b does not satisfy the *-property with respect to f′, then (s, o, x) ≠ b′
Theorem: Σ(R, D, W, z0) satisfies the ds-property iff the initial state z0 satisfies the ds-property and W satisfies the following conditions for each (ri, di, (b′, m′, f′, h′), (b, m, f, h)):
if (s, o, x) ∈ b′−b, then x ∈ m′[s, o]; and
if (s, o, x) ∈ b and x ∈ m′[s, o], then (s, o, x) ≠ b′
Basic Security Theorem: A system Σ(R, D, W, z0) is secure iff z0 is a secure state and W satisfies the conditions of the above three theorems for each action.