Computer security model

Computer security model

A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all.

For a more complete list of available articles on specific security models, see Category:Computer security models.

Selected Topics

References

  • Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.
  • CISSP Boot Camp Student Guide, Book 1 (v.082807), Vigilar, Inc.

Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia

  • Computer security policy — A computer security policy defines the goals and elements of an organization s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical… …   Wikipedia

  • Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp …   Wikipedia

  • Community of interest (computer security) — This article is about a specialized meaning in the field of computer security. For the more general meaning, see Community of interest. C.O.I., Community of Interest is a means by which network assets and or network users are segregated by some… …   Wikipedia

  • International Computer Security Association — ICSA Labs (International Computer Security Association) began as NCSA (National Computer Security Association). In its early days, NCSA focused almost solely on the certification of anti virus software. Using the Consortia model, NCSA worked… …   Wikipedia

  • High watermark (computer security) — High water mark was introduced in Clark Weissmann s Security controls in the ADEPT 50 timesharing system published in the AFIPS Conference Proceedings, volume 35, pages 119 133. FJCC, 1969. It pre dates the Bell LaPadula security model, whose… …   Wikipedia

  • Computer science — or computing science (abbreviated CS) is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems. Computer scientists invent algorithmic… …   Wikipedia

  • Model-driven security — (MDS) means applying model driven approaches (and especially the concepts behind model driven software development) [1] to security. Contents 1 Development of the concept 2 Opinions of industry analysts …   Wikipedia

  • Computer Misuse Act 1990 — United Kingdom Parliament Long title An Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes. Statute book …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”