Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,833,959 papers from all fields of science
Search
Sign In
Create Free Account
Biba Model
Known as:
Biba (disambiguation)
, Biba Integrity Model
, Biba security model
The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1975, is a formal state transition system of computer security policy that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Access control
Bell–LaPadula model
Clark–Wilson model
Comparison of operating systems
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Oral Manifestations Associated to Paracoccidioidomicosis and Histoplasmosis
Rommie Merino-Alado
,
S. Mata-Essayag
,
+7 authors
M. T. Colella
2018
Corpus ID: 56166585
Objective: To determine the frequency and clinical forms of oral manifestations associated to Paracoccidioidomycosis (PCM) and…
Expand
2015
2015
Improved Biba model based on trusted computing
Gang Liu
,
Jing Zhang
,
Jinhui Liu
,
Yuan Zhang
Secur. Commun. Networks
2015
Corpus ID: 6388101
Biba model is hard to implement because the rules are too strict to meet the flexibility of system. To enhance the flexibility…
Expand
2013
2013
Comparative study of multicast authentication schemes with application to wide-area measurement system
Yee Wei Law
,
Zheng Gong
,
Tie Luo
,
S. Marusic
,
M. Palaniswami
ASIA CCS '13
2013
Corpus ID: 2753394
Multicasting refers to the transmission of a message to multiple receivers at the same time. To enable authentication of sporadic…
Expand
2010
2010
Hybrid Mandatory Integrity Model Composed of Biba and Clark-Wilson Policy
Zhou Zhou-yi
,
He Ye-ping
,
Liang Hong-liang
2010
Corpus ID: 63836129
Commercial application requires protection of integrity policy. Biba model provides a simple multi-level integrity access control…
Expand
2008
2008
Research of BLP and Biba dynamic union model based on check domain
Jun Zhang
,
Lijun Yun
,
Zheng Zhou
International Conference on Machine Learning and…
2008
Corpus ID: 30196637
This paper puts forward confidentiality and integrity dynamic union model to solve the contradiction of BLP and Biba based on…
Expand
2004
2004
A new information security model based on BLP model and Biba model
Yihe Liu
,
Xingshu Chen
Proceedings 7th International Conference on…
2004
Corpus ID: 21286145
This paper gives a new function C(N, /spl alpha/, /spl beta/) of information security, which is based on confidentiality and…
Expand
2004
2004
Security Property Based Administrative Controls
Jon A. Solworth
,
R. Sloan
European Symposium on Research in Computer…
2004
Corpus ID: 8436985
Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change…
Expand
2003
2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
H. Scherzer
,
R. Canetti
,
P. Karger
,
H. Krawczyk
,
T. Rabin
,
David C. Toll
European Symposium on Research in Computer…
2003
Corpus ID: 398156
This paper presents an authentication protocol for high-assurance smart card operating systems that support download of mutually…
Expand
2000
2000
Towards Generating a Data Integrity Standard
M. Zviran
,
Chanan Glezer
Data & Knowledge Engineering
2000
Corpus ID: 10021589
1992
1992
Simultaneous enforcement of the Bell-LaPadula and the Biba security policy models in an OSI-distributed system
J. Verschuren
,
R. Govaerts
,
J. Vandewalle
[Proceedings] Singapore ICCS/ISITA `92
1992
Corpus ID: 62397661
The article concentrates on enforcing security policies on a distributed basis. More specifically, the Biba and the B-LP security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE