Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Title: Clark Wilson Model
Description: Description of Clark Wilson Model and the current trends of the model
Description: Description of Clark Wilson Model and the current trends of the model
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
This is an integrity and provision level model which aims at guaranteeing the integrity properties
about business information and provides a platform for analyzing security business applications
...
Clack-Wilson security model is partitioned into
two;
•
•
Constrained data items (CDI)
Unconstrained data items (UDI)
CDI are objects that the integrity model is applied to
...
Two procedures are then applied to these data items for protection
...
The second procedure is the transformation procedure (TP), which changes the data items from
one valid state to another
...
Therefore, data items are only changed by transformation procedures
...
This model is still widely used
...
It does not focus of
confidentiality
...
Current trends in the model are;
The current trend, not only in Clark-Wilson security model, but also in every security model is to
join secrecy and integrity concerns in every security system
...
Title: Clark Wilson Model
Description: Description of Clark Wilson Model and the current trends of the model
Description: Description of Clark Wilson Model and the current trends of the model