Answered You can hire a professional tutor to get the answer.

QUESTION

Need an research paper on laboratory information management systems. Needs to be 5 pages. Please no plagiarism.

Need an research paper on laboratory information management systems. Needs to be 5 pages. Please no plagiarism. The use of the Bell and LaPadula Model has been successful in modeling information that is relevant to security, even though this success might be responsible for the vagueness of the model about its primitives. This vagueness can also be examined with respect to the theory that the Bell and LaPadula Model and Noninterference are equivalent. Laboratory automation makes it possible for scientists to explore data rates that otherwise may be too fast or too slow to properly examine. Therefore, an automated laboratory reduces the need for human intervention and creates a more efficient environment in which human beings and technology can interact to produce a great deal more information and accurate data that was not possible prior to automation.

Its approach is to define a set of system constraints whose enforcement will prevent any application program executed on the system from compromising system security. The model includes subjects, which represent active entities in a system (such as active processes), and objects, which represent passive entities (such as files and inactive processes). Both subjects and objects have security levels, and the constraints on the system take the form of axioms that control the kinds of access subjects may have to objects.&nbsp.

&nbsp. &nbsp. &nbsp.While the complete formal statement of the Bell-LaPadula model is quite complex, the model can be briefly summarized by these two axioms stated below:

The simple security rule, which states that a subject cannot read information for which it is not cleared (i.e. no read up)

The property that states that a subject cannot move information from an object with a higher security classification to an object with a lower classification.&nbsp. &nbsp. &nbsp. &nbsp. &nbsp.

These axioms are meant to be implemented by restriction of access rights that users or processes can have to certain objects like devices and files. The concept of trusted subjects is a less frequently described part of the Bell-LaPadula model.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question