• Corpus ID: 12043652

A Comparison of the trusted Computing Group Security Model with Clark-Wilson

  title={A Comparison of the trusted Computing Group Security Model with Clark-Wilson},
  author={Ned M. Smith},
  booktitle={Security and Management},
  • Ned M. Smith
  • Published in Security and Management 2004
  • Computer Science
Computer security designers and evaluators have relied on security models such as Clark-Wilson, Biba and BellLaPadula to better ensure secure computer system behavior meets expectations. The Trusted Computing Group (TCG) is a cross-industry organization focused on delivering security technology and building blocks for mainstream computers. A comparison of the TCG security model to the ClarkWilson model; a well-known model in industry and academia can be helpful in identifying similarities and… 

Tables from this paper



Fundamentals of computer security technology

Threats to computer systems threat trees categorization of attacks Trojan horses and viruses common attack methods security labels the lattice of security labels security policies the Bell-Lapadula

A Comparison of Commercial and Military Computer Security Policies

It is argued that a lattice model is not sufficient to characterize integrity policies, and that distinct mechanisms are needed to Control disclosure and to provide integrity.

The Clark-Wilson Security Model http://rr.sans.org/policy/clark-wilson.php v

  • Supporting Real World Security Models in Java, 7th IEEE Workshop on Future Trends of Distributed Computing Systems, FTDCS'99. Cape Town
  • 1999