5.8. Terms and Concepts

secure, 230lattice model, 239
trust, 231Bell–La Padula model, 241
trusted process, 231simple security property, 242
trusted software, 231*-property, 242
trusted system, 231write-down, 242
security policy, 232Biba model, 243
military security policy, 232simple integrity policy, 243
sensitivity level, 232integrity *-property, 243
object, 232Graham–Denning model, 244
need-to-know rule, 232Harrison–Ruzzo–Ullman model, 245
compartment, 232take–grant system, 248
classification, 234least privilege, 252
clearance, 234economy of mechanism, 252
dominance, 234open design, 252
subject, 234complete mediation, 252
hierarchical security, 235permission-based access, 252
nonhierarchical security, 235separation of privilege, 252
Clark–Wilson policy, 236 ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.