Question: Ring Policy The ring policy [ 1 9 6 ] ignores the issue of indirect modification and focuses on direct modification only. This solves the
Ring Policy
The ring policy ignores the issue of indirect modification and focuses on direct modification only. This solves the problems described above. The rules are as follows:
Any subject may read any object, regardless of integrity levels.
s in S can write to o in O if and only if io is
s in S can execute s in S if and only if is is
The difference between this policy and the lowwatermark policy is simply that any subject can read any object.
Theorem If there is an information transfer path from object o in O to object on in O then enforcement of the lowwatermark policy requires that ion io for all n
Proof If an information transfer path exists between o and on then Definition gives a sequence of subjects and objects identifying the entities on the path. Without loss of generality, assume that each read and write was performed in the order of the indices of the vertices. By induction, for any k n isk minioj j k after k reads. As the nth write succeeds, by rule ion isn Thus, by transitivity, ion io
This policy prevents direct modifications that would lower integrity labels. It also prevents indirect modification by lowering the integrity label of a subject that reads from an object with a lower integrity level.
The problem with this policy is that, in practice, the subjects change integrity levels. In particular, the level of a subject is nonincreasing, which means that it will soon be unable to access objects at a high integrity level. An alternative policy is to decrease object integrity levels rather than subject integrity levels, but this policy has the property of downgrading object integrity levels to the lowest level.
now with this information Prove or disprove: Theorem holds for Bibas ring policy described in Section
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
