Page 537 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 537

models and their functions. This includes the state machine model,
               Bell-LaPadula, Biba, Clark-Wilson, the information flow model, the

               noninterference model, the Take-Grant model, the access control
               matrix model, and the Brewer and Nash model.
   532   533   534   535   536   537   538   539   540   541   542