{"title":"到Bell和返回:为C/sup /系统开发正式的安全策略模型","authors":"R. A. Gove, Lisa M. Jaworski, John G. Williams","doi":"10.1109/CSAC.1991.213010","DOIUrl":null,"url":null,"abstract":"The authors describe several interesting aspects of the development of a formal security policy model for a military command and control (C/sup 2/) system. The C/sup 2/ system is being built to meet the B3 division and class of DOD 5200.28 STD. The paper discusses the real world issues involved in developing a useful and accurate model of a very complex security policy. The policy developed for the target application has several interesting features and consequently the model is interesting in several respects. The system has several policy elements that required some novel mathematical approaches. These are explained in detail.<<ETX>>","PeriodicalId":108621,"journal":{"name":"Proceedings Seventh Annual Computer Security Applications Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"To Bell and back: developing a formal security policy model for a C/sup 2/ system\",\"authors\":\"R. A. Gove, Lisa M. Jaworski, John G. Williams\",\"doi\":\"10.1109/CSAC.1991.213010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The authors describe several interesting aspects of the development of a formal security policy model for a military command and control (C/sup 2/) system. The C/sup 2/ system is being built to meet the B3 division and class of DOD 5200.28 STD. The paper discusses the real world issues involved in developing a useful and accurate model of a very complex security policy. The policy developed for the target application has several interesting features and consequently the model is interesting in several respects. The system has several policy elements that required some novel mathematical approaches. These are explained in detail.<<ETX>>\",\"PeriodicalId\":108621,\"journal\":{\"name\":\"Proceedings Seventh Annual Computer Security Applications Conference\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1991-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings Seventh Annual Computer Security Applications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1991.213010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Seventh Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1991.213010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
To Bell and back: developing a formal security policy model for a C/sup 2/ system
The authors describe several interesting aspects of the development of a formal security policy model for a military command and control (C/sup 2/) system. The C/sup 2/ system is being built to meet the B3 division and class of DOD 5200.28 STD. The paper discusses the real world issues involved in developing a useful and accurate model of a very complex security policy. The policy developed for the target application has several interesting features and consequently the model is interesting in several respects. The system has several policy elements that required some novel mathematical approaches. These are explained in detail.<>