Configure multi-level security policy using RBAC model

Hao Huang
2008-01-01
Abstract:This paper presented the method of configuring BLP using RBAC,including implementing the security level,simple security condition,*-property,strict *-property and means of defining the trusted range for trusted subjects.
What problem does this paper attempt to address?