Menu
Home
People
Places
Arts
History
Plants & Animals
Science
Life & Culture
Technology
Reference.org
Computer security model
open-in-new
Selected topics
Access control list
(ACL)
Attribute-based access control
(ABAC)
Bell–LaPadula model
Biba model
Brewer and Nash model
Capability-based security
Clark-Wilson model
Context-based access control
(CBAC)
Graham-Denning model
Harrison-Ruzzo-Ullman
(HRU)
High-water mark (computer security)
Lattice-based access control
(LBAC)
Mandatory access control
(MAC)
Multi-level security
(MLS)
Non-interference (security)
Object-capability model
Protection ring
Relationship-based access control
(ReBAC)
Role-based access control
(RBAC)
Take-grant protection model
Discretionary access control
(DAC)
See also
Security modes
Protection mechanism
Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.
CISSP Boot Camp Student Guide, Book 1 (v.082807), Vigilar, Inc.