Bell–LaPadula model

Known as: Bell-La Padula model, Tranquility principle, Bell-LaPadula 
The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1981-2017
05101519812017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Specifically, suppose we have a BLP model which consists Currently most computer security models are classified among the tl:l… (More)
Is this relevant?
2015
2015
Cloud computing is one of the emerging technologies that is being used widely these days. It makes use of the computing resources… (More)
  • figure 2
  • figure 3
Is this relevant?
2008
2008
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The… (More)
Is this relevant?
2008
2008
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
In this paper we address the problem of comparing access control models. Indeed, many access control models can be found in the… (More)
Is this relevant?
2006
2006
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
Is this relevant?
Highly Cited
1990
Highly Cited
1990
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really a theory of information… (More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Everyone who has seen the movie Wall Street wi~l have seen a commercial security policy in action. The recent work of Clark and… (More)
Is this relevant?
Highly Cited
1985
Highly Cited
1985
Many claim that the security model developed by Bell and LaPadula and used as a basis for numerous prototype military computer… (More)
Is this relevant?
1984
1984
  • Tad Taylor
  • 1984 IEEE Symposium on Security and Privacy
  • 1984
This paper provides a brief explanation of the two most cited models in the field of computer security and points out the basic… (More)
Is this relevant?