Computer security model
Appearance
A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all.
For a more complete list of available articles on specific security models, see Category:Computer security models.
Selected Topics
- Access control list (ACL)
- Capability-based security
- Multi-level security (MLS)
- Role-based access control (RBAC)
- Lattice-based access control (LBAC)
- Bell-LaPadula model
- Biba model
- Clark-Wilson model
- Graham-Denning model
- Take-grant protection model
- Object-capability model
- Brewer_and_Nash_model
- Non-interference (security)
- Unknown Security Guy
References
- Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.
- CISSP Boot Camp Student Guide, Book 1 (v.082807), Vigilar, Inc.