This post features abstract IT security models.
List of IT Security Models
IT security models featured on this post:
- Belle-LaPadula
- Biba
- Graham-Denim model
- HRU model
- Brewer and Nash model
Belle-LaPadula
Belle-LaPadula focuses on confidentiality.
Biba
Biba model focuses on integrity rather than confidentiality.
Clark-Wilson Model
Graham-Denim Model
HRU Model
Harrison-Ruzzo-Ullman (HRU) model extends the Graham-Denim model.
Brewer and Nash Model
The Brewer and Nash model was proposed by David F. C. Brewer and Michael J. Nash.
Read the original document “The Chinese Wall Security Policy“.
Access Control Models
You can read about access control models on this post.
You might also be interested in…
External References
- Wikipedia community; “Computer security model“; Wikipedia