Talk:Biba Model

Latest comment: 5 years ago by 192.31.106.34 in topic "Monk" example

Untitled

edit

Page added; verified against http://www.itsecurity.com/dictionary/biba.htm. joey h. May. 19, 06:52:05 UTC

Need to add the additional behavioral rules and subsequent proofs. Dthvt 20:49, 8 December 2006 (UTC)Reply

Merger

edit

I'm recommending that Biba Integrity Model be merged to Biba Model since the other related models all follow the "Inventor-Name Model" title convention. Dthvt 21:16, 8 December 2006 (UTC)Reply

I second this. In most security textbooks and literatures the model is simply known as the "Biba Model". Atholas 04:52, 16 December 2006 (UTC)Reply

I've started some merger work. Need someone to review or help. Luis F. Gonzalez 05:17, 27 December 2006 (UTC)Reply

"Monk" example

edit

How about adapting the "monk" example to a "secret researcher" example like in Bell-LaPadula model? Seems more logic to me.

Actually I think the monks analogy is very easy to understand and remember (learning for exam right now) —Preceding unsigned comment added by 78.128.196.95 (talk) 19:29, 4 February 2008 (UTC)Reply
Actually it's very confusing, since why would a high priest not be able to read what a monk writes? The example does imply a hierarchy and a directed link, but the semantics of the metaphor don't map to reality under experiential analysis. 192.31.106.34 (talk) 13:41, 21 July 2019 (UTC)Reply

I have added another analogy which further illustrates it. I think someone should pick one or the other in the long run. —Preceding unsigned comment added by 165.124.188.243 (talk) 08:02, 27 July 2009 (UTC)Reply