Is invoked for every access attempt
Is impossible to circumvent and be foolproof
Is complete, verified, and tested
Bell-LaPadula Enforces confidentiality and uses three rules: the simple security rule, the * property, and the strong star rule.
Biba Integrity model that has two basic rules: "no write up" and "no read down."
Clark-Wilson Integrity model with three goals: maintaining consistency, preventing unauthorized access, and preventing improper modification. Makes use of an access triple through a restricted interface.
Noninterference Prevents a subject or process from one sensitivity level from affecting subjects or process at other sensitivity levels.
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
We Want to Hear from You!
The CISSP Certification Exam
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Business Continuity Planning
Law, Investigations, and Ethics
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2