Lattice-based access control models

  title={Lattice-based access control models},
  author={Ravi S. Sandhu},
Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information. In the late 1970s and early 1980s, researchers applied these models to certain integrity concerns. Later, application of the models to the Chinese Wall policy, a confidentiality policy unique to the commercial sector, was demonstrated. A balanced perspective on lattice-based access control models is provided. Information flow policies, the military lattice, access… CONTINUE READING
Highly Influential
This paper has highly influenced 39 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 641 citations. REVIEW CITATIONS
386 Citations
10 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 386 extracted citations

641 Citations

Citations per Year
Semantic Scholar estimates that this publication has 641 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 10 references

The Modeling and Representation of Security Semantics for Database Applications

  • G. W. Smith
  • Ph.D. thesis, George Mason University,
  • 1990
Highly Influential
5 Excerpts

Architectural Implications of Covert Channels.

  • N. E. Proctor, P. G. Neumann
  • Proceedings 15th NIST-NCSC National Computer…
  • 1992
1 Excerpt

A Practical Alternative to Hierarchical Integrity Poli- cies.

  • W. E. Boebert, R. Y. Kain
  • Proceedings of the 8th NBS-NSA National Computer…
  • 1985
3 Excerpts

Integrity Considerations for Secure Computer Systems." Mitre TR-3153

  • K. J. Biba
  • Mitre Corporation,
  • 1977
3 Excerpts

Similar Papers

Loading similar papers…