IT Security Models

This post features abstract IT security models.

List of IT Security Models

IT security models featured on this post:

  • Belle-LaPadula
  • Biba
  • Graham-Denim model
  • HRU model
  • Brewer and Nash model

Belle-LaPadula

Belle-LaPadula focuses on confidentiality.

Biba

Biba model focuses on integrity rather than confidentiality.

Clark-Wilson Model

Graham-Denim Model

HRU Model

Harrison-Ruzzo-Ullman (HRU) model extends the Graham-Denim model.

Brewer and Nash Model

The Brewer and Nash model was proposed by David F. C. Brewer and Michael J. Nash.

Read the original document “The Chinese Wall Security Policy“.

Access Control Models

You can read about access control models on this post.

You might also be interested in…

External References

Leave a Reply

Your email address will not be published. Required fields are marked *