Statements (23)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security_component
|
| gptkbp:category |
computer security
information security |
| gptkbp:conceptIntroducedBy |
gptkb:James_Anderson
|
| gptkbp:enforcedBy |
gptkb:government_agency
gptkb:security gptkb:access_control_policy |
| gptkbp:guarantees |
subjects access objects according to policy
|
| gptkbp:introducedIn |
gptkb:Anderson_Report
1972 |
| gptkbp:partOf |
operating system security
|
| gptkbp:relatedTo |
gptkb:Bell-LaPadula_model
gptkb:Biba_model gptkb:trusted_computing_base security kernel |
| gptkbp:requires |
always invoked
tamperproof verifiable |
| gptkbp:usedIn |
gptkb:Trusted_Computer_System_Evaluation_Criteria
gptkb:Common_Criteria |
| gptkbp:bfsParent |
gptkb:Windows_NT
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
Security Reference Monitor
|