Page 80 - DCAP516_COMPUTER_SECURITY
P. 80

Computer Security




                    Notes          7.4       Models of Security

                                   It is common practice, when we want to understand a subject, to build a logical model and study
                                   that logical model. Of course, the logical model is useful only to the extent that it corresponds to
                                   the real system, but we can try to get better models. Models of security are used for a number of
                                   purposes.
                                   1.  To test the policy for consistency and adequate coverage.
                                   2.  To document the policy.
                                   3.  To validate the policy; i.e. to determine that the policy meets its requirements.
                                   There are many useful models of security, most of which focus on multi-level security. We shall
                                   discuss some of these, despite this author’s documented skepticism that multi-level security
                                   systems are feasible with today’s hardware running today’s operating systems.
                                   Multi-Level Security


                                   The idea of multi-level security is that some data are more sensitive than others. When we try to
                                   formalize a model of multi-level security using the most obvious model, we arrive at a slight
                                   problem. Consider the four traditional security classifications and their implied order.

                                   Unclassified ≤ Confidential ≤ SECRET ≤ Top Secret
                                   This is an example of what mathematicians call a total ordering. A total ordering is a special case
                                   of an ordering on a set. We first define partial ordering.

                                   A partial order (or partial ordering) is defined for a set S as follows.
                                   1.  There is an equality operator, =, and by implication an inequality operator, ≠.
                                       Any two elements of the set, a ∈ S and b ∈ S can be compared.

                                       Either a = b or a ≠ b. All sets share this property.
                                   2.  There is an ordering operator ≤, and by implication the operator ≥.
                                       If a ≤ b, then b ≥ a. Note that the operator could be indicated by another symbol.
                                   3.  The operator is transitive.
                                       For any a ∈ S, b ∈ S, c ∈ S, if a ≤ b and b ≤ c, then a ≤ c.

                                   4.  The operator is antisymmetric.
                                       For any a ∈ S, b ∈ S, if a ≤ b and b ≤ a, then a = b.
                                   If, in addition to the above requirements for a partial ordering, it is the case that for any two
                                   elements a ∈ S, b ∈ S, that either a ≤ b or b ≤ a, then the relation is a total ordering. We are fairly
                                   familiar with sets that support a total ordering; consider the set of positive integers.
                                   In models of the security world, it is often the case that two items cannot be compared by an
                                   ordering operator. It has been discovered that the mathematical object called a lattice provides
                                   a better model of security.
                                   A lattice is a set S that supports a partial order, with the following additional requirements.
                                   1.  Every pair of elements a ∈ S, b ∈ S possess a common upper bound; i.e., there is an element
                                       u ∈ S, such that a ≤ u and b ≤ u.
                                   2.  Every pair of elements a ∈ S, b ∈ S possess a common lower bound; i.e., there is an element
                                       l ∈ S, such that l ≤ a and l ≤ b.



          74                                LOVELY PROFESSIONAL UNIVERSITY
   75   76   77   78   79   80   81   82   83   84   85