by Reashad Hossain | Dec 12, 2022 | Security
An access control matrix is a list of objects along with the permissions granted for each object. You can think of an access control matrix as a group of ACLs. Each ACL represents a single object and lists all the permissions for that object. A capability table is a...
by Reashad Hossain | Dec 11, 2022 | Security
A protection domain consists of the execution and memory space assigned to each process The use of protection rings is a scheme that supports multiple protection domains. Source: https://en.wikipedia.org/wiki/Protection_ring
by Reashad Hossain | Dec 11, 2022 | Security
Clark-Wilson David Clark and David Wilson created the Clark-Wilson model, and its primary goal is information integrity, although it is more stringent than the Biba model. It also helps enforce the separation of duties principle. Brewer-Nash The Brewer-Nash...
by Reashad Hossain | Dec 11, 2022 | Security
The Biba model, another MAC-based model, enforces integrity (unlike the Bell-LaPadula model, which enforces confidentiality). Biba includes two rules that are reversed from the Bell-LaPadula model: Simple Integrity Axiom—no read down : Subjects granted...
by Reashad Hossain | Dec 11, 2022 | Security
David Elliott Bell and Leonard J. LaPadula designed the Bell-LaPadula model with a primary goal of ensuring confidentiality. It enforces security through two primary rules, commonly called no read up and no write down. Each of these rules compares the subject’s...