Which of the following security models dictates that subjects can only access objects through applications?
The Biba model is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.
The Clark-Wilson security model provides a foundation for specifying and analyzing an integrity policy for a computing system.
Answer option C is incorrect. The Bell-LaPadula access control model is mainly used in military systems.
Answer option A is incorrect. There is no such access control model as Clark-Biba.
Kirk
4 months agoDominque
4 months agoTheron
4 months agoDominque
4 months agoJoaquin
4 months agoJaney
5 months agoWillard
5 months agoIrene
5 months agoShalon
5 months agoDalene
5 months agoKiera
5 months agoFrancesco
5 months agoMauricio
5 months agoStacey
10 months agoBette
8 months agoTimothy
8 months agoCammy
8 months agoBulah
10 months agoYong
9 months agoWilletta
9 months agoMitzie
9 months agoEliseo
9 months agoDaron
10 months agoShannan
8 months agoMila
8 months agoFreida
8 months agoLera
8 months agoJacqueline
9 months agoStacey
9 months agoShad
9 months agoBo
10 months agoBeatriz
10 months agoElroy
11 months agoLelia
10 months agoZona
10 months agoYan
11 months agoDaren
11 months agoTarra
11 months ago