Which of the following security models dictates that subjects can only access objects through applications?

Which of the following security models dictates that subjects can only access objects through
applications?

Which of the following security models dictates that subjects can only access objects through
applications?

A.
Biba-Clark model

B.
Bell-LaPadula

C.
Clark-Wilson

D.
Biba model



Leave a Reply 0

Your email address will not be published. Required fields are marked *