Display title | Computer security model |
Default sort key | Computer security model |
Page length (in bytes) | 1,628 |
Namespace ID | 0 |
Page ID | 3024922 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of page watchers | 39 |
Number of page watchers who visited in the last 30 days | 3 |
Number of redirects to this page | 2 |
Counted as a content page | Yes |
Wikidata item ID | Q5157582 |
Local description | Plan for specifying and enforcing security policies |
Central description | scheme for specifying and enforcing security policies; may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no theoretical grounding at all; implemented through a computer security policy |
Page views in the past 30 days | |
Edit | Allow all users (no expiry set) |
Move | Allow all users (no expiry set) |
Page creator | CISSP Researcher (talk | contribs) |
Date of page creation | 04:12, 29 October 2005 |
Latest editor | 176.3.90.94 (talk) |
Date of latest edit | 14:25, 17 July 2024 |
Total number of edits | 81 |
Recent number of edits (within past 30 days) | 0 |
Recent number of distinct authors | 0 |
Hidden categories (2) | This page is a member of 2 hidden categories (help):
|
Transcluded templates (18) | Pages transcluded onto the current version of this page (help):
|
Wikidata entities used in this page | |