A discuss of computer security strategy models

From the three basic character of the computer security: confidentiality, integrity, availability, the paper studies the Bell-Lapadula confidentiality model, the Biba integrity model, the Clark-Wilson integrity model and Chinese wall Model. This paper also studies the relation among three models of the Bell-Lapadula model, the Biba model and he Clark-Wilson model, studies the relation and distinguishes between the Bell-Lapadula model and the China Wall model from the point of the information security.

[1]  Guixiong Liu,et al.  Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection , 2009, 2009 International Conference on Computational Intelligence and Security.

[2]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[3]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[4]  T. Young CHINESE WALL SECURITY MODEL AND CONFLICT ANALYSIS , 2000 .

[5]  Tsau Young Lin,et al.  Chinese wall security policy-an aggressive model , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.

[6]  Joos Vandewalle,et al.  Simultaneous enforcement of the Bell-LaPadula and the Biba security policy models in an OSI-distributed system , 1992, [Proceedings] Singapore ICCS/ISITA `92.