Skip to main content

Bell–La Padula Model

  • Reference work entry
Encyclopedia of Cryptography and Security

Synonyms

BLP; BLP model; Secure computer system model

Related Concepts

Access Control; Chinese-Wall Model; Reference Monitor; The Clark–Wilson Model

Definition

The Bell and La Padula Model is a state-based computer security model that is the most widely used model for the production and evaluation of commercial products and systems approved for operational use. It was developed and explicated in a series of four technical reports between 1972 and 1974. The first three reports provided an ability to describe three aspects of security called “simple-security,” “discretionary-security,” and “ ⋆ -property” (pronounced “star-property”) and produced analytical tools for use in evaluating products and systems for conformance to those three aspects of security. The fourth report unified the exposition of the previous three reports and provided the first “model interpretation,” providing a careful correspondence between the Multics system and the model. Later work refined the analytical tools...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Anderson JP (1972) Computer security technology planning study. ESD-TR-73-51, vol I, AD-758 206, ESD/AFSC, Hanscom AFB, Massachusetts

    Google Scholar 

  2. Brewer D, Nash M (1989) The Chinese wall security policy. In: Proceedings of the 1989 IEEE symposium on security and privacy, Oakland, May 1989, pp 206–214

    Google Scholar 

  3. Clark D, Wilson D (1987) A comparison of commercial and military computer security policies. In: Proceedings of the 1987 IEEE symposium on security and privacy, Oakland, 27–29 Apr 1987, pp 184–194

    Google Scholar 

  4. Department of Defense Trusted Computer System Evaluation Criteria, CSC-STD-001-83, 15 Aug 1983

    Google Scholar 

  5. Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, Dec 1985

    Google Scholar 

  6. Bell D Elliott (1973) Secure computer systems: a refinement of the mathematical model, MTR-2547, vol III. The MITRE Corporation, Bedford, p 25 (ESD-TR-73-278-III)

    Google Scholar 

  7. Bell D Elliott (1973) Secure computer systems: a network interpretation. In: Proceedings of the second aerospace computer conference, McLean, 2–4 Dec 1986, pp 32–39

    Google Scholar 

  8. Bell D Elliott (1990) Lattices, policies, and implementations. In: Proceedings of the 13th national computer security conference, Washington, DC, 1–4 Oct 1990, pp 165–171

    Google Scholar 

  9. Bell D Elliott (1991) Putting policy commonalities to work. In: Proceedings of the 14th national computer security conference, Washington, DC, 1–4 Oct 1991, pp 456–471

    Google Scholar 

  10. Bell D Elliott (2005) Looking back at the Bell-La Padula model. In: Proceedings of the ACSAC, Tucson, AZ, 7–9 Dec 2005, pp 337–351

    Google Scholar 

  11. Bell D Elliott, La Padula LJ (1973) Secure computer systems: mathematical foundations, MTR-2547, vol I. The MITRE Corporation, Bedford (ESD-TR-73-278-I)

    Google Scholar 

  12. Bell D Elliott, La Padula LJ (1975) Secure computer systems: unified exposition and multics interpretation, MTR-2997. The MITRE Corporation, Bedford (ESD-TR-75-306)

    Google Scholar 

  13. Graham GS, Denning PJ (1972) Protection – principles and practice. In: Proceedings of the SJCC, Atlantic City, NJ, pp 417–429

    Google Scholar 

  14. La Padula LJ, Bell D Elliott (1973) Secure computer systems: a mathematical model, MTR-2547, vol. II. The MITRE Corporation, Bedford (ESD-TR-73-278-II)

    Google Scholar 

  15. Saltzer J (1974) Protection and the control of information in Multics. Comm ACM 17(7):388–402

    Article  Google Scholar 

  16. Thompson K (1989) On trusting trust. Unix Rev 7(11): 70–74

    Google Scholar 

  17. Ware W (ed) (1972) Defense Science Board report, Security controls for computer systems, RAND Report R-609

    Google Scholar 

  18. Weissman C (1969) Security controls in the ADEPT-50 Time-Sharing System. In: AFIPS conference proceedings, vol 35, FJCC, Montvale, NJ, 1969, pp 119–133

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Elliott Bell, D. (2011). Bell–La Padula Model. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_811

Download citation

Publish with us

Policies and ethics