Biba Model

The Biba security model is used for control of read and write accesses in computer systems based on existing user rights and their placement in a policy- based authorization system.

The Biba model was described in 1975 by Kenneth J. Biba.

The subject of the model is the data integrity. The Biba model is a reversal of the Bell - LaPadula security model, which appeals especially to the confidentiality of data accesses. A variation of the Biba model is also known under the name Low Water Mark Mandatory Access Control.

It will be checked before each access two rules:

Example:

  • Calibration of an ECG may be read by normal users only, never written, because the data can not be trusted ( no- write-up ).
  • Furthermore, the calibration procedure must never read data that have been created by a normal user, since these do not have enough integrity ( no- read- down).

Footnotes

122902
de