Перевод: с английского на русский

с русского на английский

lattice security model

См. также в других словарях:

  • Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… …   Wikipedia

  • Lattice-based access control — In computer security, lattice based access control (LBAC) is a complex access control based on the interaction between any combination of objects (such as resources, computers, and applications) and subjects (such as individuals, groups or… …   Wikipedia

  • Bell-LaPadula model — The Bell LaPadula Model is a state machine model used for enforcing access control in government and military applications. [cite book|last=Hansche|first=Susan|coauthors=John Berti, Chris Hare|title=Official (ISC)2 Guide to the CISSP… …   Wikipedia

  • Bell–LaPadula model — The Bell LaPadula Model (abbreviated BLP) is a state machine model used for enforcing access control in government and military applications.[1] It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong guidance from… …   Wikipedia

  • Binomial options pricing model — BOPM redirects here; for other uses see BOPM (disambiguation). In finance, the binomial options pricing model (BOPM) provides a generalizable numerical method for the valuation of options. The binomial model was first proposed by Cox, Ross and… …   Wikipedia

  • Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp …   Wikipedia

  • Secure state — A secure state is Information System security term to describe where entities in an computer system are divided into subjects and objects, and it can be formally proven that each state transition preserves security by moving from one secure state …   Wikipedia

  • Option (finance) — Stock option redirects here. For the employee incentive, see Employee stock option. Financial markets Public market Exchange Securities Bond market Fixed income …   Wikipedia

  • Trusted system — In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy. As such, a trusted system is one whose failure may break a specified… …   Wikipedia

  • Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… …   Wikipedia

  • John von Neumann — Von Neumann redirects here. For other uses, see Von Neumann (disambiguation). The native form of this personal name is Neumann János. This article uses the Western name order. John von Neumann …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»