Skip to main content

Registry Specification for Mandatory Access Control(MAC) Security Label Formats
draft-quigley-label-format-registry-02

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors David Quigley , Jarrett Lu , Thomas Haynes
Last updated 2014-10-19 (Latest revision 2014-04-17)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

In the past Mandatory Access Control (MAC) systems have used very rigid policies which were hardcoded into the particular protocol and platform. As MAC systems are more widely deployed additional flexibility in mechanism and policy is required. Where traditional trusted systems implemented Multi-Level Security (MLS) and integrity models, modern systems have expanded to include technologies such as type enforcement. Due to the wide range of policies and mechanisms it has proven through past efforts to be virtually impossible to accomodate all parties in one security label format and model. To allow multiple MAC mechanisms and label formats in a network, this document proposes a registry of label format specifications. This registry contains several identifiers to accomodate both integer and string preferences and associates those identifiers with an extensive document outlining the exact syntax and use of the particular label format.

Authors

David Quigley
Jarrett Lu
Thomas Haynes

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)