Security Architecture and Design/Security Models

< Security Architecture and Design

Security Models

Lattice Models

State Machine Models


Noninterference Models


Bell—LaPadula Confidentiality Model

Biba Integrity Model

Clark—Wilson Integrity Model

Access Control Matrix

Information Flow Models

Covert channels

Graham—Denning Model

Harrison—Ruzzo—Ullman Model

Brewer—Nash (Chinese Wall)

This article is issued from Wikibooks. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.