Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

University of Nevada, Las Vegas

Computer Science Faculty Research

Series

2020

Security key authorization

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

A Design Of Mac Model Based On The Separation Of Duties And Data Coloring: Dsdc-Mac, Soon-Book Lee, Yoo-Hwan Kim, Jin-Woo Kim, Chee-Yang Song Jan 2020

A Design Of Mac Model Based On The Separation Of Duties And Data Coloring: Dsdc-Mac, Soon-Book Lee, Yoo-Hwan Kim, Jin-Woo Kim, Chee-Yang Song

Computer Science Faculty Research

Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects' roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as …