Computer security model
Plan for specifying and enforcing security policies
title: "Computer security model" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["computer-security-models"] description: "Plan for specifying and enforcing security policies" topic_path: "technology/computing" source: "https://en.wikipedia.org/wiki/Computer_security_model" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0
::summary Plan for specifying and enforcing security policies ::
A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. A computer security model is implemented through a computer security policy.
For a more complete list of available articles on specific security models, see :Category:Computer security models.
Selected topics
- Access control list (ACL)
- Attribute-based access control (ABAC)
- Bell–LaPadula model
- Biba model
- Brewer and Nash model
- Capability-based security
- Clark-Wilson model
- Context-based access control (CBAC)
- Graham-Denning model
- Harrison-Ruzzo-Ullman (HRU)
- High-water mark (computer security)
- Lattice-based access control (LBAC)
- Mandatory access control (MAC)
- Multi-level security (MLS)
- Non-interference (security)
- Object-capability model
- Protection ring
- Relationship-based access control (ReBAC)
- Role-based access control (RBAC)
- Take-grant protection model
- Discretionary access control (DAC)
References
- Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.
- CISSP Boot Camp Student Guide, Book 1 (v.082807), Vigilar, Inc.
::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::