Figure 1, if we have to compare two security labels T{A, B} and S{A} then we first
conclude that T{A,B} has higher precedence than S{A} based on hierarchical
ordering of classification levels. Then we compare classification levels of two given
security labels. We conclude that T{A,B} can read data labeled S{A} since it contains
the A compartment. If we have to compare security labels T{} and S{A} then we first
conclude that T{} has higher precedence than S{A} based on hierarchical ordering of
classification levels. Then we compare classification levels of two given security
labels. We conclude that T{} cannot read data labeled S{A} since it does not contain
the A compartment.
If clearance levels are same then the classification levels determine the higher
precedence as well as the reading and writing rights. For example in Figure 1, if we
have to compare two security labels T{A,B} and T{A} then based upon classification
levels we conclude that T{A,B} has higher precedence than T{A} and T{A,B} can
read data labeled T{A}.
Algorithm: Merging MLS into IOWF
Input: IOWF
Output: IOWF with MLS features
1. Identify a set of subjects A={A
1
, A
2
,...,A
p
}, where p ≥1 for any of the workflows.
2. Determine a set of hierarchical clearance levels {X
1
, X
2
,...,X
m
} for subjects, where
1 ≤ m ≤ p and X
j
has higher precedence than X
i
for j > i.
3. Identify a set of objects B={B
1
, B
2
, ... ,B
q
} where q ≥ 0 in the same workflow.
4. Determine a set of classification levels {Y
1
, Y
2
,... Y
n
} for objects depending upon
its sensitivity, where 0 ≤ n ≤ q.
5. Combine clearance levels and classification levels to obtain security lattice with
security labels S
k
= X
i
{Y
1
, Y
2
, ... Y
j
} where i ≤ m, j ≤ n, k ≤ m2
n
, as nodes.
6. Assign security labels to subjects and objects taking into account Bell-LaPadula
security model and the working of the participating workflow, to form a security
lattice of applicable security labels. If A is a set of all subjects and S is the set of all
security labels, then there exists a many-to-one onto function f
1
: A → S. If B is a set
of all objects and S is the set of all security labels, then there exists a many-to-one
onto function f
2
: B → S.
7. Repeat steps 1 to 6 for all organizations.
8. Combine security lattices of participating organizations taking into account which
security label can read which other security label, to obtain security lattice for the
whole IOWF. If S
1
and S
2
are two security labels such that S
1
can read S
2
then
introduce an arrow from S
1
to S
2
in the security lattice indicating reading rights.
9. Compare security label of subject with security label of object it is trying to access.
Grant access only if the subject is cleared to access that object, otherwise deny access.
2.3 Bell-LaPadula Security Model
The Bell-LaPadula Model [2], also called the multi-level model, was originally
proposed by in 1970s. It is a formal state transition model of computer security policy
that describes a set of access control rules. In this formal model, the entities in a
computer system are divided into abstract sets of subjects and objects. A "subject" is
somebody (user) who wants access to an "object" (information, data file, system). The
concept of a secure state is defined, and it is proven that each state transition
55