David Elliott Bell
{{Short description|Computer security pioneer, co-developed Bell-laPadula model}}
{{Infobox officeholder
|image = 2013-DavidElliottBell-Archival-Head-2013.png
|name = David Elliott Bell
|birth_name = David Elliott Bell
|birth_place = {{nowrap|Liberal, Kansas, U.S.}}
|education = Davidson College
{{small|(Bachelor of Mathematics)}}
Vanderbilt University
{{small|(Master of Mathematics)}}
{{small|(Doctor of Mathematics)}}
}}
David Elliott Bell (born in 1945) is an American mathematician and computer security pioneer. While working at MITRE Corporation, he and Leonard J. LaPadula co-developed the highly influential Bell–LaPadula model.{{cite web |title=An Interview with David Elliott Bell |url=https://conservancy.umn.edu/bitstream/handle/11299/144024/oh411deb.pdf?sequence=1&isAllowed=y |website=Charles Babbage Institute |publisher=University of Minnesota, Minneapolis |access-date=30 November 2022 |location=Virginia |date=24 September 2012}} In 2012, Bell was interviewed as part of an effort by the National Science Foundation to document the “Building an Infrastructure for Computer Security History.”{{Cite journal |last=Bell |first=David Elliott |date=2012-09-24 |title=Oral history interview with David Elliott Bell |hdl=11299/144024 |url=http://conservancy.umn.edu/handle/11299/144024 |language=en-US}} In recognition of his contributions to the computer security field, Bell was inducted into the Cyber Security Hall of Fame in 2013.{{Cite web |title=Cyber Security Cyber Security Inductees, Class of 2013 |url=https://www.cybersecurityhalloffame.org/content/inductees/Cyber-Security-Cyber-Security-Inductees |access-date=2022-11-07 |website=www.cybersecurityhalloffame.org}}
The first step in the Bell-LaPadual model development provided tools for guiding and analyzing computer systems under development.{{cite journal|author1 = Bell, David Elliott|author2 = LaPadula, Leonard J.|name-list-style = amp|title = Secure Computer Systems: Mathematical Foundations|publisher = MITRE Corporation|year = 1973|url = http://www.albany.edu/acc/courses/ia/classics/belllapadula1.pdf|access-date = 2022-11-10|archive-date = 2006-06-18|archive-url = https://web.archive.org/web/20060618092351/http://www.albany.edu/acc/courses/ia/classics/belllapadula1.pdf|url-status = dead}} The last step in the model development was the application of the general model to the Multics operating system.{{cite journal|author1=Bell, David Elliott |author2=LaPadula, Leonard J.|name-list-style=amp |title = Secure Computer System: Unified Exposition and Multics Interpretation| publisher = MITRE Corporation |year= 1976 |url = http://csrc.nist.gov/publications/history/bell76.pdf}} When the Computer Security Center at the Department of Defense published its Trusted Computer System Evaluation Criteria in 1983, the Bell-La Padula model was the only security model included to illustrate the "security model" required at the B2 level and above.
At the 21st Annual Computer Security Applications Conference in Tucson, Arizona in 2005, Bell presented a look back at the Bell-LaPadula model.{{cite conference | author=Bell, David Elliott |date=December 2005 |name-list-style=amp| title= "Looking Back at the Bell–LaPadula Model" | url=http://www.acsac.org/2005/papers/Bell.pdf}} In 2006, Bell published an addendum to his 'Looking Back at the Bell-LaPadula Model.{{Cite journal | author=Bell, David Elliott |date= November 2006 |name-list-style=amp |title=Looking Back Addendum |url=http://selfless-security.offthisweek.com/presentations/Bell_LBA.pdf |language=en-US |archive-url= https://web.archive.org/web/20110827001250/http://selfless-security.offthisweek.com/presentations/Bell_LBA.pdf |archive-date= 2011-08-27 }}
For NSA, he was Deputy Chief of the Research Office of the Computer Security Center, Acting Chief of the Research Office, and COR for a major acquisition. At Trusted Information Systems, he was the Senior Vice President and Corporate Secretary. He ran his own consulting company (BBND, Incorporated) before returning to the technical path at Mitretek Systems and EDS.
While working at Trusted Information Systems, Bell presented two papers, "Lattices, Policies and Implementations",{{cite conference | author = Bell, David Elliott | contribution = Lattices, Policies and Implementations | title = Proceedings of the 13th National Computer Security Conference | place = Washington, DC | date = 1990 | pages = 165–171 | contribution-url = https://csrc.nist.gov/CSRC/media/Publications/conference-paper/1990/10/01/proceedings-13th-national-computer-security-conference-1990/documents/1990-13th-NCSC-proceedings-vol-1.pdf}} and "Trusted Xenix Interpretation: Phase 1".{{cite conference | author = Bell, David Elliott | contribution = Trusted Xenix Interpretation: Phase 1 | title = Proceedings of the 13th National Computer Security Conference | place = Washington, DC | date = 1990 | pages = 333–339 | contribution-url = https://csrc.nist.gov/CSRC/media/Publications/conference-paper/1990/10/01/proceedings-13th-national-computer-security-conference-1990/documents/1990-13th-NCSC-proceedings-vol-1.pdf}} At the 13th National Computer Security Conference.
The two papers Bell published in 1991 and 1992, "Lattices, Policies and Implementations" and "Putting Policy Commonalities to Work",{{cite conference | author = Bell, David Elliott | contribution = Putting Policy Commonalities to Work | title = Proceedings of the 14th National Computer Security Conference | place = Washington, DC | date = 1991 | pages = 456–471 | contribution-url = https://csrc.nist.gov/CSRC/media/Publications/conference-paper/1991/10/01/proceedings-14th-national-computer-security-conference-1991/documents/1991-14th-NCSC-proceedings-vol-2.pdf}} together showed that all the apparently different security policies that had been published were Boolean-Lattice policies, and were thus identical under the skin. His constructive result demonstrated how to realize each of the published policies using a single "Universal Lattice Machine." This work consolidated the apparently different security policies and made them one.
At the 1994 New Security Paradigms and Workshop (NSPW), Bell presented his paper on "Modeling the 'multi-policy machine' ".{{cite conference | author = Bell, David Elliott | contribution = Modeling the multi-policy machine | title = Proceedings of the 1994 New Security Paradigms and Workshop | place = Little Compton, RI | date = 1994 | contribution-url = https://dl.acm.org/doi/pdf/10.5555/283849.283854 }} Paper Abstract: A method of treating several unspecified policies is presented. Precise notions of policy combination, policy conflict, conflict resolution, and policy precedence are introduced. Necessary and sufficient conditions for policies to be combined without conflict are established.
In 1996, while working for Mitretek Systems, Bell published a paper on "Generic Model Interpretations POSIX.1 and SQL" as an improvement to trusted systems that conform to industry standards that are conducive to generic model interpretation.{{Cite journal | author=Bell, David Elliott |date= October 1996 |title=Generic Model Interpretations POSIX.1 and SQL |url=https://csrc.nist.gov/csrc/media/publications/conference-paper/1996/10/22/proceedings-of-the-19th-nissc-1996/documents/paper049/gmi-nis.pdf |language=en-US |website=csrc.nist.gov }}
References
{{Reflist}}
{{Authority control}}
{{DEFAULTSORT:Bell, David Elliot}}
Category:Computer security models
Category:Computer access control