- Biba model
- модель Биба (модельное представление целостности вычислительной системы, предусматривающая выделение объектов и субъектов целостности)
English-Russian dictionary of computer science and programming. 2013.
English-Russian dictionary of computer science and programming. 2013.
Biba Model — The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1977 [Biba, K. J. Integrity Considerations for Secure Computer Systems , MTR 3153, The Mitre Corporation, April 1977.] , is a formal state transition system of computer… … Wikipedia
Biba — This article is about the fashion store; other meanings are computer security model Biba Integrity Model, and British Insurance Brokers Association.Biba was an iconic and popular fashion store in the 1960s and 1970s.GenesisReady to wear fashion… … Wikipedia
Bell-LaPadula model — The Bell LaPadula Model is a state machine model used for enforcing access control in government and military applications. [cite book|last=Hansche|first=Susan|coauthors=John Berti, Chris Hare|title=Official (ISC)2 Guide to the CISSP… … Wikipedia
Bell–LaPadula model — The Bell LaPadula Model (abbreviated BLP) is a state machine model used for enforcing access control in government and military applications.[1] It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong guidance from… … Wikipedia
Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… … Wikipedia
Brewer and Nash model — The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also known as the Chinese wall model, was designed to provide controls that mitigate conflict of interest… … Wikipedia
Graham-Denning model — The Graham Denning Model is a security model that shows how subjects and objects should be created and deleted.It also addresses how to assign specific access rights.This model addresses the security issues associated with how to define a set of… … Wikipedia
Clark-Wilson model — The Clark Wilson integrity model provides a foundation for specifying and analyzing an integrity policy for a computing system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is… … Wikipedia
Computer security policy — A computer security policy defines the goals and elements of an organization s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical… … Wikipedia
Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… … Wikipedia
Low watermark (computer security) — Low watermark is an extension to Biba Model. In Biba model, no write up and no read down rules are enforced. In this model the rules are exactly opposite of the rules in Bell LaPadula model. In Low watermark model, read down is permitted, but the … Wikipedia