Jump to content

Talk:Biba Model: Difference between revisions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Content deleted Content added
Added assessment
m →‎Merger: formatting
Line 18: Line 18:
How about adapting the "monk" example to a "secret researcher" example like in [[Bell-LaPadula model]]? Seems more logic to me.
How about adapting the "monk" example to a "secret researcher" example like in [[Bell-LaPadula model]]? Seems more logic to me.


- Actually I think the monks analogy is very easy to understand and remember (learning for exam right now) <small>—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/78.128.196.95|78.128.196.95]] ([[User talk:78.128.196.95|talk]]) 19:29, 4 February 2008 (UTC)</small><!-- Template:UnsignedIP --> <!--Autosigned by SineBot-->
:Actually I think the monks analogy is very easy to understand and remember (learning for exam right now) <small>—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/78.128.196.95|78.128.196.95]] ([[User talk:78.128.196.95|talk]]) 19:29, 4 February 2008 (UTC)</small><!-- Template:UnsignedIP --> <!--Autosigned by SineBot-->


I have added another analogy which further illustrates it. I think someone should pick one or the other in the long run. <span style="font-size: smaller;" class="autosigned">—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/165.124.188.243|165.124.188.243]] ([[User talk:165.124.188.243|talk]]) 08:02, 27 July 2009 (UTC)</span><!-- Template:UnsignedIP --> <!--Autosigned by SineBot-->
I have added another analogy which further illustrates it. I think someone should pick one or the other in the long run. <span style="font-size: smaller;" class="autosigned">—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/165.124.188.243|165.124.188.243]] ([[User talk:165.124.188.243|talk]]) 08:02, 27 July 2009 (UTC)</span><!-- Template:UnsignedIP --> <!--Autosigned by SineBot-->

Revision as of 00:51, 6 January 2013

WikiProject iconComputer Security: Computing Start‑class Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
MidThis article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Answer question about Same-origin_policy
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconComputing Start‑class
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
WikiProject iconEducation Unassessed
WikiProject iconThis article is within the scope of WikiProject Education, a collaborative effort to improve the coverage of education and education-related topics on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.

Page added; verified against http://www.itsecurity.com/dictionary/biba.htm. joey h. May. 19, 06:52:05 UTC

Need to add the additional behavioral rules and subsequent proofs. Dthvt 20:49, 8 December 2006 (UTC)[reply]

Merger

I'm recommending that Biba Integrity Model be merged to Biba Model since the other related models all follow the "Inventor-Name Model" title convention. Dthvt 21:16, 8 December 2006 (UTC)[reply]

I second this. In most security textbooks and literatures the model is simply known as the "Biba Model". Atholas 04:52, 16 December 2006 (UTC)[reply]

I've started some merger work. Need someone to review or help. Luis F. Gonzalez 05:17, 27 December 2006 (UTC)[reply]

How about adapting the "monk" example to a "secret researcher" example like in Bell-LaPadula model? Seems more logic to me.

Actually I think the monks analogy is very easy to understand and remember (learning for exam right now) —Preceding unsigned comment added by 78.128.196.95 (talk) 19:29, 4 February 2008 (UTC)[reply]

I have added another analogy which further illustrates it. I think someone should pick one or the other in the long run. —Preceding unsigned comment added by 165.124.188.243 (talk) 08:02, 27 July 2009 (UTC)[reply]