CFP last date
22 April 2024
Reseach Article

Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company

by Rathnakar Acharya, Dr. V. Vityanathan, Dr. Pethur Raj Chellaih
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 8
Year of Publication: 2010
Authors: Rathnakar Acharya, Dr. V. Vityanathan, Dr. Pethur Raj Chellaih
10.5120/1599-2148

Rathnakar Acharya, Dr. V. Vityanathan, Dr. Pethur Raj Chellaih . Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company. International Journal of Computer Applications. 11, 8 ( December 2010), 37-45. DOI=10.5120/1599-2148

@article{ 10.5120/1599-2148,
author = { Rathnakar Acharya, Dr. V. Vityanathan, Dr. Pethur Raj Chellaih },
title = { Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 11 },
number = { 8 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 37-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume11/number8/1599-2148/ },
doi = { 10.5120/1599-2148 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:00:04.909119+05:30
%A Rathnakar Acharya
%A Dr. V. Vityanathan
%A Dr. Pethur Raj Chellaih
%T Secured Information Access based on Bell LaPadula model A Case of Novel Publishing Company
%J International Journal of Computer Applications
%@ 0975-8887
%V 11
%N 8
%P 37-45
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information is one of the important assets of an organization. Protection of information assets is necessary to establish and maintain trust between the organizations and its customers. Information security is the process by which an organization protects and secures its resources and maintains information vital to its operation. When our resources go online are available to multiple users it is vulnerable to all kinds of security threats. Proper access control mechanisms will prevent the unauthorized users to make an attempt to access the corporate database or other user’s information’. This paper presents an approach to the formed analysis of security required and access based on Bell LaPadula model followed with a case study conducted on a leading publishing company.

References
  1. D. Bell and L. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, MITRE Corp., Bedford, MA, July 1976. Available from World Wide Web: http://csrc.nist.gov/publications/history/bell76.pdf.
  2. M. Blaze. "Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks." March 2003. IEEE Security and Privacy. March/April 2003
  3. M. Blaze, J. Ioannidis, A. Keromytis. "DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System." RFC-2792. IETF, March 2000
  4. M. Blaze. "Toward a broader view of security protocols." 12th Cambridge International Workshop on Security Protocols. Cambridge, UK. April 2004
  5. Briney, A & Prince, F (2002), Does sixe Matter? Information security, September, 36-39.
  6. Brown, C, V., & Bostrom, R.P (1994) Organization designs for the management of end-user computing: Reexamining the contingences Journal of Management Information Systems, 10(4), 183.
  7. CAMERO, KIM what is a digital Identity? 2005.http://www.identityblog.com/2005/03/07.html#a152.
  8. E. Cronin, M. Sherr, and M. Blaze. "The Eavedsdropper's Dilemma." Technical Report MS-CIS-05-24. University of Pennsylvania. 2005
  9. Cullery A, (2003), Computer forensics: past present and future, Information security Technical report, vol 8 nr 2, p32-35, Elsevier.
  10. ELOFF JHP. (2002a). what does an international standard say on information security policies? IT security workshop.
  11. M. Sherr, E. Cronin, S. Clark and M. Blaze. "Signaling Vulnerabilities in Wiretapping Systems." IEEE Security and Privacy. November/December 2005
  12. SINANGIN D, (2002), Computer forensics investigation in a corporate environment, Computer Fraud and Security Bulletin, 8, p.11-14, June 2002.
  13. VON SOLMS SH. (2001a). Information security A multidimensional discipline, Computers and security, volume 19, number 7, Elsevier.
  14. WHITMAN, MATFORD H, (2003), Principles of Information Security. Thompson Publishing
Index Terms

Computer Science
Information Sciences

Keywords

Information security Bell LaPadula model IDS Access mode Access control