Graham-Denning model

Graham-Denning model

The Graham-Denning Model is a security model that shows how subjects and objects should be created and deleted.It also addresses how to assign specific access rights.

This model addresses the security issues associated with how to define a set of basic rights on how specific subjects can execute security functions on an object. The model has eight basic protection rules that outline:

* How to securely create an object.
* How to securely create a subject.
* How to securely delete an object.
* How to securely delete a subject.
* How to securely provide the read access right.
* How to securely provide the grant access right.
* How to securely provide the delete access right.
* How to securely provide the transfer access right.

ee also

* Bell-LaPadula model
* Biba model
* Brewer and Nash model
* Clark-Wilson model
* Harrison-Ruzzo-Ullman model

References

*Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Bell-LaPadula model — The Bell LaPadula Model is a state machine model used for enforcing access control in government and military applications. [cite book|last=Hansche|first=Susan|coauthors=John Berti, Chris Hare|title=Official (ISC)2 Guide to the CISSP… …   Wikipedia

  • Bell–LaPadula model — The Bell LaPadula Model (abbreviated BLP) is a state machine model used for enforcing access control in government and military applications.[1] It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong guidance from… …   Wikipedia

  • Biba Model — The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1977 [Biba, K. J. Integrity Considerations for Secure Computer Systems , MTR 3153, The Mitre Corporation, April 1977.] , is a formal state transition system of computer… …   Wikipedia

  • Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… …   Wikipedia

  • Brewer and Nash model — The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also known as the Chinese wall model, was designed to provide controls that mitigate conflict of interest… …   Wikipedia

  • Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… …   Wikipedia

  • Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… …   Wikipedia

  • Security modes — Generally, Security modes refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various levels of security classification. The mode of operation is… …   Wikipedia

  • United Kingdom company law — Beside the River Thames, the City of London is a global financial centre. Within the Square Mile, the London Stock Exchange lies at the heart of the United Kingdom s corporations. United Kingdom company law is the body of rules that concern… …   Wikipedia

  • List of computer scientists — Expand list|date=August 2008This is a list of well known computer scientists, people who do work in computer science, in particular researchers and authors.Some persons notable as programmers are included here because they work in research as… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”