Information security models
Computer security is based on the role of various entities within the system and their CIA requirement. Information security models address the CIA requirements in computing systems and data.
Take-grant model
This computer security model is also called the take-grant protection model and it specifies obtaining (taking) rights from one entity and giving them to another or the transferring (granting) of rights by one entity to another. There are two entities defined in this model: a subject and object. In simple terms, this model proposes a directed graph that represents the transfer of rights.
There are four rules in this model; they are as follows:
Take rule: The subject takes rights of another subject
Grant rule: The subject grants rights to another subject
Create rule: The subject creates new nodes
Remove rule: The subject removes its rights over an object
Bell-LaPadula model
This is a data-confidentiality model developed by David Elliot Bell and Len LaPadula. Since...