HOME

TheInfoList



OR:

{{short description, Plan for specifying and enforcing security policies A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of
distributed computing Distributed computing is a field of computer science that studies distributed systems, defined as computer systems whose inter-communicating components are located on different networked computers. The components of a distributed system commu ...
, or no particular theoretical grounding at all. A computer security model is implemented through a computer security policy. For a more complete list of available articles on specific security models, see :Computer security models.


Selected topics

* Access control list (ACL) * Attribute-based access control (ABAC) * Bell–LaPadula model * Biba model * Brewer and Nash model * Capability-based security * Clark-Wilson model * Context-based access control (CBAC) * Graham-Denning model * Harrison-Ruzzo-Ullman (HRU) * High-water mark (computer security) *
Lattice-based access control In computer security, lattice-based access control (LBAC) is a complex access control model based on the interaction between any combination of objects (such as resources, computers, and applications) and subjects (such as individuals, groups or o ...
(LBAC) * Mandatory access control (MAC) * Multi-level security (MLS) * Non-interference (security) * Object-capability model * Protection ring * Relationship-based access control (ReBAC) * Role-based access control (RBAC) * Take-grant protection model * Discretionary access control (DAC)


See also

* Security modes * Protection mechanism


References

* Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003. * CISSP Boot Camp Student Guide, Book 1 (v.082807), Vigilar, Inc.