A Comparison of the trusted Computing Group Security Model with Clark-Wilson
@inproceedings{Smith2004ACO, title={A Comparison of the trusted Computing Group Security Model with Clark-Wilson}, author={Ned M. Smith}, booktitle={Security and Management}, year={2004} }
Computer security designers and evaluators have relied on security models such as Clark-Wilson, Biba and BellLaPadula to better ensure secure computer system behavior meets expectations. The Trusted Computing Group (TCG) is a cross-industry organization focused on delivering security technology and building blocks for mainstream computers. A comparison of the TCG security model to the ClarkWilson model; a well-known model in industry and academia can be helpful in identifying similarities and…
No Paper Link Available
Tables from this paper
References
SHOWING 1-4 OF 4 REFERENCES
Fundamentals of computer security technology
- Computer Science
- 1994
Threats to computer systems threat trees categorization of attacks Trojan horses and viruses common attack methods security labels the lattice of security labels security policies the Bell-Lapadula…
A Comparison of Commercial and Military Computer Security Policies
- Computer Science1987 IEEE Symposium on Security and Privacy
- 1987
It is argued that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to Control disclosure and to provide integrity.
The Clark-Wilson Security Model http://rr.sans.org/policy/clark-wilson.php v
- Supporting Real World Security Models in Java, 7th IEEE Workshop on Future Trends of Distributed Computing Systems, FTDCS'99. Cape Town
- 1999