LectureNote7-ClarkWilson

LectureNote7-ClarkWilson - C LARK-W ILSON M ODEL C LARK-W...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: C LARK-W ILSON M ODEL C LARK-W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 1 / 92 Clark-Wilson Model of Integrity C LARK-W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 2 / 92 ● Data integrity ✦ Quality ✦ Correctness ✦ Authenticity ✦ Accuracy ● System integrity ✦ Successful and correct operation of system Integrity in Clark Wilson Model C LARK-W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 3 / 92 ● Integrity defined by a set of constraints ● Data is in a consistent state when it satisfies these constraints ✦ For some data integrity may not matter ● If all relevant data is in consistent state, system integrity is satisfied Separation of Duty C LARK-W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 4 / 92 ● No single person or entity should perform a task from beginning to end but the task should be divided among two or more people or entities Well-formed Transactions C LARK-W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 5 / 92 ● User should not be able to manipulate data arbitrarily but only in constrained, well-defined ways that preserve the integrity of the data Principle of Least Privilege C LARK-W ILSON M...
View Full Document

This note was uploaded on 05/29/2010 for the course CS 556 taught by Professor Staff during the Spring '08 term at Colorado State.

Page1 / 17

LectureNote7-ClarkWilson - C LARK-W ILSON M ODEL C LARK-W...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online