computer security model (Q3475): Difference between revisions
Jump to navigation
Jump to search
Created a new Item: computer security model, scheme for specifying and enforcing security policies; may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no theoretical grounding at all; implemented through a computer security policy |
Created claim: subclass of (P1): computer security (Q3469) |
||
Property / subclass of | |||
Property / subclass of: computer security / rank | |||
Normal rank |
Latest revision as of 20:55, 24 February 2023
scheme for specifying and enforcing security policies; may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no theoretical grounding at all; implemented through a computer security policy
Language | Label | Description | Also known as |
---|---|---|---|
English | computer security model |
scheme for specifying and enforcing security policies; may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no theoretical grounding at all; implemented through a computer security policy |