5.8. Terms and Concepts
secure, 230 | lattice model, 239 |
trust, 231 | Bell–La Padula model, 241 |
trusted process, 231 | simple security property, 242 |
trusted software, 231 | *-property, 242 |
trusted system, 231 | write-down, 242 |
security policy, 232 | Biba model, 243 |
military security policy, 232 | simple integrity policy, 243 |
sensitivity level, 232 | integrity *-property, 243 |
object, 232 | Graham–Denning model, 244 |
need-to-know rule, 232 | Harrison–Ruzzo–Ullman model, 245 |
compartment, 232 | take–grant system, 248 |
classification, 234 | least privilege, 252 |
clearance, 234 | economy of mechanism, 252 |
dominance, 234 | open design, 252 |
subject, 234 | complete mediation, 252 |
hierarchical security, 235 | permission-based access, 252 |
nonhierarchical security, 235 | separation of privilege, 252 |
Clark–Wilson policy, 236 ... |
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.