Question

Hi I need someone to generate a BLP Lattice system with an access control matrix as such:

2 Generate a BL lattce structured system where the objects and subjects are appropriately levelled to give access consistent with the access control matrix below. You need to deseribe the process by which you obtain your lattice. R and W correspond, respectively, to read and append. You are to use only the mandatory BLP rules, and a default allow in place of the discretionary rule. Be sure to add a level as necssary to ensure this is a lattice.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

If I recall correctly, BLP is an example of a MAC (mandatory access control) system, while the access matrix you post is a simple RBAC system. We can't necessarily 'convert' between the two. MAC is based on the idea of labels (secret, top-secret etc), preventing information flow in certain directions between labels. RBAC is a completely 'flat' system; users are given rights to objects without regards to information flow.

So, you can't 'convert' the access matrix, but you can arrive at a lattice based on the access matrix by 'inventing' the extra information needed. Try to categorize the objects into MAC levels, and then assign users to those levels. We may arrive at conflicts: a user that has write access to a lower level (which violates the no-write-down property of BLP). Perhaps you could split the user in two, but in reality you wouldn't want people using multiple accounts. Another solution is to upgrade the classification of some objects, but that may give rise to new conflicts.

Add a comment
Know the answer?
Add Answer to:
Hi I need someone to generate a BLP Lattice system with an access control matrix as...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • A small financial firm is currently using ACL (Access Control List), a discretionary access control mechanism, for the protection of its resources (including computer systems and data files). As...

    A small financial firm is currently using ACL (Access Control List), a discretionary access control mechanism, for the protection of its resources (including computer systems and data files). As the firm is small, its resources are located in the same building and managed in the same domain. However, recently this firm is planning a merger with another firm, and if this merger is successful, its IT system will be transformed into a large-scale distributed system where resources will be managed...

  • 2. In a Mandatory Access Control (MAC) system, the subjects and objects in the system have high, ...

    2. In a Mandatory Access Control (MAC) system, the subjects and objects in the system have high, medium, and low security labels. The levels are ordered as High> Medium> Low Object Subject Si S2 S3 Subject Label Low, ) (High, (Proj1)) (Medium, (Pro/1, Proj2) o1 02 | Оз Object Label (High, (Proj1)) (Medium, 0) (Low:(Proj1, Proj2)) a. Fill out the following protection state access control matrix considering the above security levels and labels based on Bell-LaPadula model. Use the symbol...

  • Hi I need a fix in my program. The program needs to finish after serving the...

    Hi I need a fix in my program. The program needs to finish after serving the customers from the queue list. Requeriments: Headers: DynamicArray.h #ifndef DynamicArray_h #define DynamicArray_h #include using namespace std; template class DynamicArray { V* values; int cap; V dummy; public: DynamicArray(int = 2); DynamicArray(const DynamicArray&); ~DynamicArray() { delete[] values; } int capacity() const { return cap; } void capacity(int); V operator[](int) const; V& operator[](int); DynamicArray& operator=(const DynamicArray&); }; template DynamicArray::DynamicArray(int cap) { this->cap = cap; values =...

  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • PLEASE SOLVE THESE PROBLEMS! URGENT 8/16/2019 How to Recognize Plagiarism -- Undergraduate Certification Tests : School...

    PLEASE SOLVE THESE PROBLEMS! URGENT 8/16/2019 How to Recognize Plagiarism -- Undergraduate Certification Tests : School of Education, Indiana University Bloomington In the case below, the original source material is given along with a View Site sample of student work. Determine the type of plagiarism by clicking Map the appropriate radio button. Original Source Material Student Version Acknowledge Site Suppose you study a group of successful companies and you find that they emphasize customer focus, or quality improvement, or empowerment;...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT