().
:
() [4] - () .
.
( ) [4] - , () .
1. , , [8]
\ | ||
1. | () Access to information | , , , |
2. | () Security policy | , |
3. | Authorized access to information | , |
4. | () Unauthorized access to information | , , : , |
5. | ( ) Protection from unauthorized access | |
6. | () Access subject | , |
7. | () Access object | , |
8. | Subject privilege | |
9. | ( ) Security policy violator | , |
10. | ( ) Security policy violators model | ( ) |
11. | () Trusted computing base | , |
12. | () Security policy realization | |
13. | Access identifier | |
14. | Identification | () |
15. | Password | , () |
16. | Authentication | ; |
17. | ( ) Trusted computer system | ( ), |
18. | ( ) Protection facility | , - , |
19. | Protection model | ( ) - () |
20. | Multilevel security | , |
21. | , Protection class of computer systems | ( ) |
22. | () Cryptographic information protection facility | , |
|
|