The security model with no read-down and no write-up is:

a. Multilevel
b. Clark-Wilson
c. Bell-LaPadula
d. Biba

d. Biba

Computer Science & Information Technology

You might also like to view...

What cell phone technology is the most popular in the United States?

A. GSM B. CDMA C. EDGE D. SIM

Computer Science & Information Technology

What problem can arise with a policy requiring users to change passwords at regular intervals?

What will be an ideal response?

Computer Science & Information Technology