4. Security Models and Architecture

4. Security Models and Architecture

4.1 Security Models and Systems Evaluation

  • Security Models and Architecture Overview

  • Systems Evaluation Methods:

    • Orange Book

    • Rainbow Series

    • IT Security Evaluation Criteria

    • Common Criteria (ISO/IEC 15408)


4.2 Formal Security Models

  • Lattice-Based Model

  • State Machine Model

  • Bell-LaPadula Model (Confidentiality Focused)

  • Biba Model (Integrity Focused)

  • Clark-Wilson Model

  • Information Flow Model

  • Noninterference Model

  • Brewer and Nash Model (Cinderella / Chinese Wall Model)

  • Graham-Denning Model

  • Harrison-Ruzzo-Ullman Model


4.3 Security Architecture Frameworks

  • The Open Group Architecture Framework (TOGAF)

  • Sherwood Applied Business Security Architecture (SABSA)

  • Open Security Architecture (OSA)

  • IPSec Architecture