Security Models.html


* created: 2026-04-23T18:42
* modified: 2026-05-22T18:31

title

Title

description

Description

related notes

Security Models

These describe criteria by which authorization systems are modeled.

Bell-LaPadula (BLP)

"No Read Up, No Write Down"

You can read things at or below your level and write things at or above your level. This does only protect against data leaks and not corruption. This model prioritizes confidentiality.

It's based around Mandatory Access Control in combination with Discretionary Access Control.

Given a subject (s) and an object (o):

Biba

"No Read Down, No Write Up"

Biba addresses the opposite concern: protecting data from being modified in untrusted ways. It's useful in environments where accurate and untampered data matters more than secrecy. This model prioritizes integrity.

It's a variant of Mandatory Access Control.

Clark Wilson

This models data access around explicitly constraining resources. Access requests are handled by a transformation process that converts the request into permissions. These permissions are forwarded to the integration verification process, which performs authentication and authorization. Unconstrained resources can be accessed without this procedure.

Chinese Wall

This model doesn't use a fixed hierarchy or integrity lattice. Instead it groups companies into conflict-of-interest classes (e.g. all oil companies in one class), and access history dynamically determines what a subject may access next.