Multilevel Security | part of Security Engineering: A Guide to Building Dependable Distributed Systems | Wiley Data and Cybersecurity books | IEEE Xplore

Multilevel Security


Chapter Abstract:

This chapter explores the multilevel security policy model used in many military and intelligence systems, which hold information at different levels of classification, a...Show More

Chapter Abstract:

This chapter explores the multilevel security policy model used in many military and intelligence systems, which hold information at different levels of classification, and have to ensure that data can be read only by a principal whose clearance level is at least as high. Such policies are increasingly also known as information flow control. Systems that enforce a security policy independently of user actions are described as having mandatory access control (MAC), as opposed to the discretionary access control in systems like Unix where users can take their own access decisions about their files. Integrity‐only approach to MAC does mean that malware running at Low can steal all the data; so some users might care to set ‘NoReadUp’ for sensitive directories.
Page(s): 315 - 339
Copyright Year: 2020
Edition: 3
ISBN Information:

Contact IEEE to Subscribe