High-water Mark (computer Security)
High-water mark was introduced in Clark Weissmann in 1969. It pre-dates the Bell-LaPadula security model, whose first volume appeared in 1972.
Under high-water mark, any object less than the user's security level can be opened, but the object is relabeled to reflect the highest security level currently open. Hence the name.
The practical effect of the high-water mark was a gradual movement of all objects towards the highest security level in the system. If user A is writing a CONFIDENTIAL document, and checks the unclassified dictionary, the dictionary becomes CONFIDENTIAL. Then, when user B is writing a SECRET report and checks the spelling of a word, the dictionary becomes SECRET. Finally, if user C is assigned to assemble the daily intelligence briefing at the TOP SECRET level, reference to the dictionary makes the dictionary TOP SECRET, too.
Read more about High-water Mark (computer Security): Low-water Mark
Famous quotes containing the words high-water and/or mark:
“The high-water mark, so to speak, of Socialist literature is W.H. Auden, a sort of gutless Kipling.”
—George Orwell (19031950)
“For all of them have contributed out of their abundance; but she out of her poverty has put in everything she had, all she had to live on.”
—Bible: New Testament, Mark 12:44.
Jesus watching the widow contribute her two mites.