Question:
The Clark-Wilson Model.
Author: John IntindoloAnswer:
Which security model is used when an untrusted entity is being forced through an interface to access a trusted resource? - The Bell-LaPadula Model - The Biba Model - The Clark-Wilson Model - The Brewer-Nash Model
0 / 5 Â (0 ratings)
1 answer(s) in total