Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 8 - Article 8
Year of Publication: 2010
Authors:
Rathnakar Acharya
Dr. V. Vityanathan
Dr. Pethur Raj Chellaih
10.5120/1599-2148

Rathnakar Acharya, Dr. V Vityanathan and Dr. Pethur Raj Chellaih. Article: Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company. International Journal of Computer Applications 11(8):37–45, December 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Rathnakar Acharya and Dr. V. Vityanathan and Dr. Pethur Raj Chellaih},
	title = {Article: Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {11},
	number = {8},
	pages = {37--45},
	month = {December},
	note = {Published By Foundation of Computer Science}
}

Abstract

Information is one of the important assets of an organization. Protection of information assets is necessary to establish and maintain trust between the organizations and its customers. Information security is the process by which an organization protects and secures its resources and maintains information vital to its operation. When our resources go online are available to multiple users it is vulnerable to all kinds of security threats. Proper access control mechanisms will prevent the unauthorized users to make an attempt to access the corporate database or other user’s information’. This paper presents an approach to the formed analysis of security required and access based on Bell LaPadula model followed with a case study conducted on a leading publishing company.

Reference

  • D. Bell and L. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, MITRE Corp., Bedford, MA, July 1976. Available from World Wide Web: http://csrc.nist.gov/publications/history/bell76.pdf.
  • M. Blaze. "Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks." March 2003. IEEE Security and Privacy. March/April 2003
  • M. Blaze, J. Ioannidis, A. Keromytis. "DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System." RFC-2792. IETF, March 2000
  • M. Blaze. "Toward a broader view of security protocols." 12th Cambridge International Workshop on Security Protocols. Cambridge, UK. April 2004
  • Briney, A & Prince, F (2002), Does sixe Matter? Information security, September, 36-39.
  • Brown, C, V., & Bostrom, R.P (1994) Organization designs for the management of end-user computing: Reexamining the contingences Journal of Management Information Systems, 10(4), 183.
  • CAMERO, KIM what is a digital Identity? 2005.http://www.identityblog.com/2005/03/07.html#a152.
  • E. Cronin, M. Sherr, and M. Blaze. "The Eavedsdropper's Dilemma." Technical Report MS-CIS-05-24. University of Pennsylvania. 2005
  • Cullery A, (2003), Computer forensics: past present and future, Information security Technical report, vol 8 nr 2, p32-35, Elsevier.
  • ELOFF JHP. (2002a). what does an international standard say on information security policies? IT security workshop.
  • M. Sherr, E. Cronin, S. Clark and M. Blaze. "Signaling Vulnerabilities in Wiretapping Systems." IEEE Security and Privacy. November/December 2005
  • SINANGIN D, (2002), Computer forensics investigation in a corporate environment, Computer Fraud and Security Bulletin, 8, p.11-14, June 2002.
  • VON SOLMS SH. (2001a). Information security A multidimensional discipline, Computers and security, volume 19, number 7, Elsevier.
  • WHITMAN, MATFORD H, (2003), Principles of Information Security. Thompson Publishing