Clark-Wilson model

Clark-Wilson model
Модель Кларка – Уилсона (модельное представление стратегии обеспечения целостности коммерческой вычислительной системы на основе выделения уровней привилегий)

English-Russian dictionary of computer science and programming. 2013.

Игры ⚽ Поможем сделать НИР

Смотреть что такое "Clark-Wilson model" в других словарях:

  • Clark-Wilson model — The Clark Wilson integrity model provides a foundation for specifying and analyzing an integrity policy for a computing system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is… …   Wikipedia

  • Clark Atlanta University — Seal Motto I’ll Find a Way or Make One (Atlanta University); Culture for Service (Clark College) [1] Established July 1, 1988 …   Wikipedia

  • Bell-LaPadula model — The Bell LaPadula Model is a state machine model used for enforcing access control in government and military applications. [cite book|last=Hansche|first=Susan|coauthors=John Berti, Chris Hare|title=Official (ISC)2 Guide to the CISSP… …   Wikipedia

  • Bell–LaPadula model — The Bell LaPadula Model (abbreviated BLP) is a state machine model used for enforcing access control in government and military applications.[1] It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong guidance from… …   Wikipedia

  • David D. Clark — For other notable people of the same name, see David Clark (disambiguation). David Dana Clark Born April 7, 1944 …   Wikipedia

  • Wilson Hirschfeld — (September 4, 1916 mdash; March 2, 1974) was a journalist and former managing editor of the Cleveland Plain Dealer who reportedly once remarked that he knew no one with as much integrity as himself *.In his teenage years Wilson attended Glenville …   Wikipedia

  • Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… …   Wikipedia

  • Brewer and Nash model — The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also known as the Chinese wall model, was designed to provide controls that mitigate conflict of interest… …   Wikipedia

  • Graham-Denning model — The Graham Denning Model is a security model that shows how subjects and objects should be created and deleted.It also addresses how to assign specific access rights.This model addresses the security issues associated with how to define a set of… …   Wikipedia

  • Wilson reading system — The Wilson Reading System is a research based reading and writing program designed for students (grades 2 12 and adults) who have difficulty with decoding (reading) and encoding (spelling). It is a complete curriculum that has 12 steps, beginning …   Wikipedia

  • Biba Model — The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1977 [Biba, K. J. Integrity Considerations for Secure Computer Systems , MTR 3153, The Mitre Corporation, April 1977.] , is a formal state transition system of computer… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»