High watermark (computer security)
From Wikipedia, the free encyclopedia
This article is orphaned as few or no other articles link to it. Please help introduce links in articles on related topics. (November 2006) |
The introduction to this article provides insufficient context for those unfamiliar with the subject. Please help improve the article with a good introductory style. |
High-water mark was introduced in Clark Weissmann's Security controls in the ADEPT-50 timesharing system published in the AFIPS Conference Proceedings, volume 35, pages 119--133. FJCC, 1969. It pre-dates the Bell-LaPadula security model, whose first volume appeared in 1972.
Under high-water mark, any object less than the user's security level can be opened, but the object is relabeled to reflect the highest security level currently open. Hence the name.
The practical effect of the high-water mark was a gradual movement of all objects towards the highest security level in the system. If user A is writing a CONFIDENTIAL document, and checks the unclassified dictionary, the dictionary becomes CONFIDENTIAL. Then when user B is writing an SECRET report and checks the spelling of a word, the dictionary become SECRET. If user C is assigned to assemble the daily intelligence briefing at TOP SECRET, reference to the dictionary makes the dictionary TOP SECRET.