Jump to content

Computer security model: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
→‎Selected Topics: Just assuming Protection ring belongs here, since the lede of that article says it's the opposite of capability-based security.
Line 22: Line 22:
* [[Take-grant protection model]]
* [[Take-grant protection model]]
* [[Protection ring]]
* [[Protection ring]]
* [[High-water mark (computer security)]]


==References==
==References==

Revision as of 12:01, 28 December 2016

A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. A computer security model is implemented through a computer security policy.

For a more complete list of available articles on specific security models, see Category:Computer security models.

Selected Topics

References

  • Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.
  • CISSP Boot Camp Student Guide, Book 1 (v.082807), Vigilar, Inc.