Proiect realiza t de: Bărăgău Andrei ,IESC,TI,4LF361 [606412]
MODELE SI PROGRAME DE SECURITATE
Proiect realiza t de: Bărăgău Andrei ,IESC,TI,4LF361
Profesor coordonator: Manea Adrian
An universitar 2019/2020
2
Cuprins
………………………….. ………………………….. ………………………….. ……………………… 3
………………………….. ………………………….. ………………………….. ………….. 3
………………………….. ………………………….. ………………………….. ………………………….. . 4
………………………….. ………………………….. ……………………… 5
………………………….. ………………………….. ………………………….. ………………. 6
………………………….. ………………………….. ………………………….. ………….. 7
………………………….. ………………………….. ………………………….. ………………….. 7
………………………….. ………………………….. ………………………….. …………………. 8
………………………….. ………………………….. … 8
………………………….. ………………………….. ……………… 9
………………………….. ………………………….. ……… 10
………………………….. ……………………… 11
………………………….. …………… 12
………………………….. ………………………….. ………………………….. ………………… 13
………………………….. ………………………….. ………………………….. ………………………….. …….. 14
3
4
5
6
7
8
9
10
11
12
13
14
[1] Hansche, Susan; John Berti; Chris Hare (2003). Official (ISC)2 Guide to the CISSP Exam . CRC
Press. pp. 104. ISBN 978-0-8493 -1707 -1.
[2] David Elliott Bell, Oral history interview , 24 September 2012. Charles Babbage Institute , University
of Minnesot a]
[3] Biba, K. J. "Integrity Considerations for Secure Computer Systems", MTR -3153 , The Mitre
Corporation , June 1975.
[4] https://en.wikipedia.org/wiki/Biba_Model
[5] Harrison, Michael A.; Ruzzo, Walter L.; Ullman, Jeffrey D. (August 1976). "Protection in Operating
Systems". Communications of the ACM.
[6] Clark, David D.; and Wilson, David R. ; A Comparison of Commercial and Military Computer
Security Policies ; in Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy
(SP'87), May 1987, Oakland, CA ; IEEE Press, pp. 184–193
[7] https://en.wikipedia.org/wiki/Clark%E2%80%93Wilson_model
[8] Frier, Sarah (9 October 2014). "Goldman Sachs Turns to Digital Surveillance to Catch Rogue
Bankers" . Bloomberg Businessweek. Archived from the original on 2014 -10-20. Retrieved 2014 -10-17.
[9] https://www.linkedin.com/pulse/secur ity-models -integrity -confidentiality -protection -data –
justiniano
[10] https://www.g2.com/categories/data -security
[11] Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases wit h Access: Nelson
Australia Pty Limited. p4 -5.
[12] Knowing Your Data to Protect Your Data Archived 2017 -09-28 at the Wayback Machine
[13] Jacobs, S. (2011). Engineering information security: The application of systems engineering
concepts to achieve information assurance
[14]Cliff Zou, Spring 2012 , Software Security Introduction, CAP6135: Malware and Software
Vulnera bility Analysis
[15] Protection: Bell -Lapadula Model by Harsh Manocha,
http://courses.cs.vt.edu/~cs5204/fall99/protection/harsh/
[16] Biba Integrity Model, Finjan Team , December 6, 2016, https://blog.finjan.com/biba -integrity –
model/
[17]CS590U Access Control: Theory and Practice Lecture 6 (January 27) The Harrison -Ruzzo -Ullman
Model , https://www.cs.purdue.edu/homes/ninghui/courses/Spring05/lectures/lecture06.pdf
[18] https://www.drchaos.com/home/clark -wilson -security -model
Copyright Notice
© Licențiada.org respectă drepturile de proprietate intelectuală și așteaptă ca toți utilizatorii să facă același lucru. Dacă consideri că un conținut de pe site încalcă drepturile tale de autor, te rugăm să trimiți o notificare DMCA.
Acest articol: Proiect realiza t de: Bărăgău Andrei ,IESC,TI,4LF361 [606412] (ID: 606412)
Dacă considerați că acest conținut vă încalcă drepturile de autor, vă rugăm să depuneți o cerere pe pagina noastră Copyright Takedown.
