Lines Matching full:integrity
36 .Nd "Biba data integrity policy"
59 policy module implements the Biba integrity model,
60 which protects the integrity of system objects and subjects by means of
62 In Biba, all system subjects and objects are assigned integrity labels, made
68 with higher values reflecting higher integrity.
83 label is assigned to system objects which affect the integrity of the system
103 A subject at the same integrity level as an object may both read from
106 A subject at a higher integrity level than an object may write to the object,
109 A subject at a lower integrity level than an object may read the object,
116 These rules prevent subjects of lower integrity from influencing the
117 behavior of higher integrity subjects by preventing the flow of information,
118 and hence control, from allowing low integrity subjects to modify either
119 a high integrity object or high integrity subjects acting on those objects.
120 Biba integrity policies may be appropriate in a number of environments,
122 and corruption of user data if marked as higher integrity than the attacker.
123 In traditional trusted operating systems, the Biba integrity model is used
126 The Biba integrity model is similar to
128 with the exception that LOMAC permits access by a higher integrity subject
129 to a lower integrity object, but downgrades the integrity level of the subject
130 to prevent integrity rules from being violated.
134 The Biba integrity model is also similar to
140 integrity, of subjects and objects.
143 reflecting the integrity of the object, or integrity of the data contained
161 greater or equal integrity to the low end of the range, and lesser or equal
162 integrity to the high end of the range.
192 Enables enforcement of the Biba integrity policy.