Registry Specification for Mandatory Access Control(MAC) Security Label Formats
draft-quigley-label-format-registry-02

Document Type Expired Internet-Draft (individual)
Last updated 2014-10-19 (latest revision 2014-04-17)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html
Stream Stream state (No stream defined)
Document shepherd No shepherd assigned
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-quigley-label-format-registry-02.txt

Abstract

In the past Mandatory Access Control (MAC) systems have used very rigid policies which were hardcoded into the particular protocol and platform. As MAC systems are more widely deployed additional flexibility in mechanism and policy is required. Where traditional trusted systems implemented Multi-Level Security (MLS) and integrity models, modern systems have expanded to include technologies such as type enforcement. Due to the wide range of policies and mechanisms it has proven through past efforts to be virtually impossible to accomodate all parties in one security label format and model. To allow multiple MAC mechanisms and label formats in a network, this document proposes a registry of label format specifications. This registry contains several identifiers to accomodate both integer and string preferences and associates those identifiers with an extensive document outlining the exact syntax and use of the particular label format.

Authors

David Quigley (dpquigl@davequigley.com)
Jarrett Lu (Jarrett.Lu@oracle.com)
Tom Haynes (thomas.haynes@primarydata.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)