(18.226.28.76)
Users online: 5970     
Ijournet
Email id
 

JIMS8I - International Journal of Information Communication and Computing Technology
Year : 2014, Volume : 2, Issue : 1
First page : ( 49) Last page : ( 53)
Online ISSN : 2347-7202.

A survey of computer security models

Muttoo S.K.1, Kumar Sushil2, Tyagi Nidhi

1Department of Computer Science, University of Delhi, Delhi. Email: skmutto@cs.du.ac.in

2Department of Computer Science, Shobhit university, Merrut. Email: kumar.sk106@gmail.com

Online published on 22 June, 2017.

Abstract

A security model maps the abstract goals of the security policy of information system by specifying information flow necessary to enforce the security policy. The security model that characterize the security goal in a form, which are then mapped to system details. The security model takes the requirement and provides the necessary mathematical formulas, relationships, and structure to be followed to accomplish the security goal. This paper gives brief introduction of security model from the beginning.

Top

Keywords

Security, access control, information flow, confidentiality, subject, object, integrity, security policy, roles, permission.

Top

  
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
765,537,062 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.