StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Comparisong between the Bell-LaPadula model and the Biba model - Essay Example

Cite this document
Summary
Bell LaPuda model does not address enforcement of privacy requirements associated with purpose binding. In some cases, the enforcement of purpose binding is enforced only if sets of categories related to sensitivity levels were utilized for model resolutions (Fischer-Hübner)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Comparisong between the Bell-LaPadula model and the Biba model
Read Text Preview

Extract of sample "Comparisong between the Bell-LaPadula model and the Biba model"

Download file to see previous pages

The Biba model does not reflect “write-up” or “write-down”, however, if a highly confidential or top secret information access is granted, the privileged user cannot read highly confidential information and cannot write to any authorized level other than the assigned authorized level. This restriction prevents the integrity of highly confidential information from low important information to be intermixed. Another explanation of the Biba model would incorporate integrity as its main focus i.e. gauging integrity in a scenario where a highly sensitive data placed in a way that it intermixes with low sensitive data by retrieving the data from a low level application or program, the integrity of that information can be demoted.

For example, if an employee in an organization is utilizing an insecure application or program to view highly sensitive or top secret information, the application may corrupt that information or make temporary files that can be viewed by someone else later. A scenario is selected incorporating Clark Wilson deployment in the UNIX operating system environment. Phantoms users are used in this scenario, as they resemble to locked accounts and their identity cannot be visible to users (Bishop 2003).

In a selected scenario where, a triple user is donated by ‘TP’ and every TP is configured to be an owner of the phantom user (Bishop 2003). We will allocate the phantom user in groups that preserves every CDI allocated in the CDI sets. Now we will allocate all users ‘execute’ rights for executing TP located on the CDI’s allocated on the CDI set that is available in the ‘group owner’ of that specific TP. One of the examples of this scenario incorporates access to each specific CDI is limited to users only i.e. in the triple, TP is assumed to be any one of the TP

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Comparisong between the Bell-LaPadula model and the Biba model Essay”, n.d.)
Comparisong between the Bell-LaPadula model and the Biba model Essay. Retrieved from https://studentshare.org/information-technology/1455233-comparisong-between-the-bell-la-padula-model-and-the-biba-model
(Comparisong Between the Bell-LaPadula Model and the Biba Model Essay)
Comparisong Between the Bell-LaPadula Model and the Biba Model Essay. https://studentshare.org/information-technology/1455233-comparisong-between-the-bell-la-padula-model-and-the-biba-model.
“Comparisong Between the Bell-LaPadula Model and the Biba Model Essay”, n.d. https://studentshare.org/information-technology/1455233-comparisong-between-the-bell-la-padula-model-and-the-biba-model.
  • Cited: 1 times

CHECK THESE SAMPLES OF Comparisong between the Bell-LaPadula model and the Biba model

The Policy Enforcement Point, Secondary and Approximate Authorization Model

From the paper "The Policy Enforcement Point, Secondary and Approximate Authorization model " it is clear that the RBAC configurations are extracted as a result of an empirically validated approach that highlighted the performance of devices with low capability up to thousand access hits every second....
6 Pages (1500 words) Essay

The Dell Direct Model

… As the author of the text puts it, through different strategies like ‘The Dell Direct model', the company has been able to improve upon their relationship with the customers and thereby enhancing customer satisfaction and boosting up sales.... Thus, this model focuses on direct relationships with the customer and enhancing sales through customer care.... Through different strategies like ‘The Dell Direct model', the company has been able to improve upon their relationship with the customers and thereby enhancing customer satisfaction and boosting up sales....
2 Pages (500 words) Essay

Modern pricing models

(2013) The Heston model and Its Extensions In Matlab And C#.... The second reason is the representation of the relationship between the volatility and the return of an underlying asset (Wang 2007, p.... As such, this gives rooms for changes to take place in the correlation between the volatility and the assets.... The person who developed this financial model was Mr.... Steven Heston, who was an associate finance professor as at the time of developing this model in 1993....
1 Pages (250 words) Essay

Security Architecture & Design models

Coming up with the best security architecture requires the management of an organization to     perform a risk assessment and management process in order to come up with the best security model to secure the system.... Data classification model that facilitates wider sharing of information through ensuring that information have been given additional controls.... The model classifies information into several categories like low, medium, high and unclassified....
5 Pages (1250 words) Assignment

The Great Britain Freight Model and Freight Transport Models

The paper "The Great Britain Freight model and Freight Transport Models" focused upon the development of projections that map existing and projected routes based upon an assessment of estimated future requirements of rail transport.... The GBFM model offers the facility of mapping routes by applying different matrices and case scenarios each time.... More and more railway links that existed earlier but have deteriorated to a run-down state are being revived; for instance, the old Swanage Railway to run steam trains between Wareham and Corfe castle has been revived....
8 Pages (2000 words) Case Study

Information Security Measures

odels of computer security such as the Bell-LaPadula model, the biba model, and the Clark-Wilson model work within the confidentiality, integrity, and availability (CIA) framework.... "Information Security Measures" paper states that a risk assessment approach is necessary for the development of systems with an acceptable level of risk....
5 Pages (1250 words) Coursework

Targets for Cyberterrorism

This research will begin with the statement that there were many developments and discoveries during the 20th and 21st centuries, with rapid changes characterizing this era.... The world was changed instantaneously, moving at a pace where there is little room for reflection.... hellip; The researcher states that technology, or to be more precise, the power of the Internet and high-speed computers distinguished the late 20th century and presented a dominant force early in the 21st century and up to now....
42 Pages (10500 words) Research Paper

Analysis of Cell Phone Comparisons

Once the information is available, it is easier to observe the differences between various models when they are placed side by side in a chart.... This report "Analysis of Cell Phone Comparisons" discusses brands and the models on basic and practical features, they have been compared for the additional feature like camera resolution since this is widely used by all cell phone users....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us