The security model with no read-down and no write-up is:
a. Multilevel
b. Clark-Wilson
c. Bell-LaPadula
d. Biba
d. Biba
Computer Science & Information Technology
You might also like to view...
What cell phone technology is the most popular in the United States?
A. GSM B. CDMA C. EDGE D. SIM
Computer Science & Information Technology
What problem can arise with a policy requiring users to change passwords at regular intervals?
What will be an ideal response?
Computer Science & Information Technology