A Security Domain Model for Implementing Trusted Subject Behaviors

Within a Multi-Level Secure (MLS) system, trusted subjects are granted privileges to perform operations that are not possible by ordinary subjects controlled by Mandatory Access Control (MAC) policy enforcement mechanisms. These subjects are trusted not to conduct malicious activity or degrade system security. The authors present a formal definition for trusted subject behaviors, which depends upon a representation of information flow and control dependencies generated during a program execution. They describe a security Domain Model (DM) designed in the alloy specification language for conducting static analysis of programs to identify illicit information flows, access control flaws and covert channel vulnerabilities.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
University of Sioux Falls
Topic:
Security
Format:
PDF