Jump to content

Talk:Computer security model

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Liam McM (talk | contribs) at 16:46, 18 December 2017 (Conflicting ideas: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputer security: Computing Start‑class Top‑importance
WikiProject iconThis article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
TopThis article has been rated as Top-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (assessed as Top-importance).
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

The link to the "Guide to CISSP" page, within the External Links section, points to a search results page which itself returns no results. I would suggest that the link is amended to instead point to the following page, still within the "Guide to CISSP" site: www.guidetocissp.com/search/label/Security%20Models%20and%20Architecture

Happy to hear comments from other Wikipedians on this.

Regards, Gareth

That site is now blacklisted for extensive spamming. --A. B. (talk) 12:50, 15 January 2008 (UTC)[reply]

Conflicting ideas

The sentences 'A computer security model is a scheme for specifying and enforcing security policies' and 'A computer security model is implemented through a computer security policy' seem to convey opposite ideas.

The first implies that a model implements a policy, the second that a policy implements a model. Which is correct? --Liam McM 16:46, 18 December 2017 (UTC)[reply]