Proiect realiza t de: Bărăgău Andrei ,IESC,TI,4LF361 [606412]

MODELE SI PROGRAME DE SECURITATE

Proiect realiza t de: Bărăgău Andrei ,IESC,TI,4LF361
Profesor coordonator: Manea Adrian

An universitar 2019/2020

2
Cuprins
………………………….. ………………………….. ………………………….. ……………………… 3
………………………….. ………………………….. ………………………….. ………….. 3
………………………….. ………………………….. ………………………….. ………………………….. . 4
………………………….. ………………………….. ……………………… 5
………………………….. ………………………….. ………………………….. ………………. 6
………………………….. ………………………….. ………………………….. ………….. 7
………………………….. ………………………….. ………………………….. ………………….. 7
………………………….. ………………………….. ………………………….. …………………. 8
………………………….. ………………………….. … 8
………………………….. ………………………….. ……………… 9
………………………….. ………………………….. ……… 10
………………………….. ……………………… 11
………………………….. …………… 12
………………………….. ………………………….. ………………………….. ………………… 13
………………………….. ………………………….. ………………………….. ………………………….. …….. 14

3






4





5



6

7

8




9

10

11

12

13

14

[1] Hansche, Susan; John Berti; Chris Hare (2003). Official (ISC)2 Guide to the CISSP Exam . CRC
Press. pp. 104. ISBN 978-0-8493 -1707 -1.
[2] David Elliott Bell, Oral history interview , 24 September 2012. Charles Babbage Institute , University
of Minnesot a]
[3] Biba, K. J. "Integrity Considerations for Secure Computer Systems", MTR -3153 , The Mitre
Corporation , June 1975.
[4] https://en.wikipedia.org/wiki/Biba_Model
[5] Harrison, Michael A.; Ruzzo, Walter L.; Ullman, Jeffrey D. (August 1976). "Protection in Operating
Systems". Communications of the ACM.
[6] Clark, David D.; and Wilson, David R. ; A Comparison of Commercial and Military Computer
Security Policies ; in Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy
(SP'87), May 1987, Oakland, CA ; IEEE Press, pp. 184–193
[7] https://en.wikipedia.org/wiki/Clark%E2%80%93Wilson_model
[8] Frier, Sarah (9 October 2014). "Goldman Sachs Turns to Digital Surveillance to Catch Rogue
Bankers" . Bloomberg Businessweek. Archived from the original on 2014 -10-20. Retrieved 2014 -10-17.
[9] https://www.linkedin.com/pulse/secur ity-models -integrity -confidentiality -protection -data –
justiniano
[10] https://www.g2.com/categories/data -security
[11] Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases wit h Access: Nelson
Australia Pty Limited. p4 -5.
[12] Knowing Your Data to Protect Your Data Archived 2017 -09-28 at the Wayback Machine
[13] Jacobs, S. (2011). Engineering information security: The application of systems engineering
concepts to achieve information assurance
[14]Cliff Zou, Spring 2012 , Software Security Introduction, CAP6135: Malware and Software
Vulnera bility Analysis
[15] Protection: Bell -Lapadula Model by Harsh Manocha,
http://courses.cs.vt.edu/~cs5204/fall99/protection/harsh/
[16] Biba Integrity Model, Finjan Team , December 6, 2016, https://blog.finjan.com/biba -integrity –
model/
[17]CS590U Access Control: Theory and Practice Lecture 6 (January 27) The Harrison -Ruzzo -Ullman
Model , https://www.cs.purdue.edu/homes/ninghui/courses/Spring05/lectures/lecture06.pdf
[18] https://www.drchaos.com/home/clark -wilson -security -model

Similar Posts