Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 1 of 1
To view the access options for this content please click here
Article
Publication date: 21 November 2008

A multidimensional approach to multilevel security

Eli Winjum and Bjørn Kjetil Mølmann

The purpose of this paper is to propose and describe a concept for multilevel security (MLS) that may be advantageous in information systems with a limited number of…

HTML
PDF (104 KB)

Abstract

Purpose

The purpose of this paper is to propose and describe a concept for multilevel security (MLS) that may be advantageous in information systems with a limited number of security levels. The concept should also adapt to information systems with limited capacities.

Design/methodology/approach

Assuming that confidentiality, integrity and availability are mutually independent security attributes of a generic information object, security requirements are modelled as a multidimensional vector space. Each axis represents one dimension of security. An axis is divided into an arbitrary number of levels. The paper shows how rules from the classic MLS models may enforce one‐directional information flow simultaneously and independently along each axis. By controlling flow this way, insecure or undefined states cannot be reached.

Findings

Handling different MLS properties independently enables an effective verification algorithm based on simple logical or binary operations. Verification of rights can be executed within a few clock cycles.

Research limitations/implications

Future research includes formal in‐depth studies of potential applications in databases, sensor information, operating systems and communication networks.

Practical implications

Simple logical port circuits may implement the proposed verification method. The method is well suited for tamper proof devices immune to software‐based attacks.

Originality/value

The paper describes a MLS concept that combines dimensions of security, like confidentiality, integrity and availability. The concept intends to be a “light‐weight” alternative to classic MLS models.

Details

Information Management & Computer Security, vol. 16 no. 5
Type: Research Article
DOI: https://doi.org/10.1108/09685220810920521
ISSN: 0968-5227

Keywords

  • Data security
  • Information systems

Access
Only content I have access to
Only Open Access
Year
  • All dates (1)
Content type
  • Article (1)
1 – 1 of 1
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here