Which of the following security models dictates that subjects can only access objects through
applications?
A.
Biba-Clark model
B.
Bell-LaPadula
C.
Clark-Wilson
D.
Biba model
Which of the following security models dictates that subjects can only access objects through
applications?
Which of the following security models dictates that subjects can only access objects through
applications?
A.
Biba-Clark model
B.
Bell-LaPadula
C.
Clark-Wilson
D.
Biba model