LectureNote7-ClarkWilson

LectureNote7-ClarkWilson - C LARK-W ILSON M ODEL C HINESE...

Info icon This preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
C LARK -W ILSON M ODEL C LARK -W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 1 / 92
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Clark-Wilson Model of Integrity C LARK -W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 2 / 92 Data integrity Quality Correctness Authenticity Accuracy System integrity Successful and correct operation of system
Image of page 2
Integrity in Clark Wilson Model C LARK -W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 3 / 92 Integrity defined by a set of constraints Data is in a consistent state when it satisfies these constraints For some data integrity may not matter If all relevant data is in consistent state, system integrity is satisfied
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Separation of Duty C LARK -W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 4 / 92 No single person or entity should perform a task from beginning to end but the task should be divided among two or more people or entities
Image of page 4
Well-formed Transactions C LARK -W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C HANNELS CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 5 / 92 User should not be able to manipulate data arbitrarily but only in constrained, well-defined ways that preserve the integrity of the data
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Principle of Least Privilege C LARK -W ILSON M ODEL C HINESE W ALL M ODEL R OLE B ASED A CCESS C ONTROL C OVERT C
Image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern