EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions

Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1726 Feb 2015 - 13:34ThomasMisa 
1602 Dec 2014 - 12:09ThomasMisa 
1522 Oct 2013 - 12:46ThomasMisa 
1403 Oct 2013 - 15:25norqu036? 
1324 Jun 2013 - 09:23NicLewis 
1219 Jun 2013 - 13:48ThomasMisa 
1103 Jun 2013 - 11:02NicLewis 
1003 Jun 2013 - 10:58NicLewis 
920 May 2013 - 10:15NicLewis 
817 May 2013 - 11:46NicLewis 
earlier first

Render style:     Context:

 History: r17 | r8 < r7 < r6 < r5
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>PubBibaModel (revision 6)

Biba Model


First published in 1975, then revised in 1977, Kenneth Biba developed the Biba model as part of a United States Air Force project for MITRE. Also known as the Biba Integrity Model, the Biba Model captures "multi-level integrity policies," to ensure that subjects do not "read-down" to objects that have lower integrity labels. Likewise, subjects are not allowed to "write-up" to objects with higher integrity labels.(1) These access control rules were developed to prevent unauthorized users modifying data, or authorized users modifying unauthorized data. This model focuses upon preserving data integrity, rather than data confidentiality, and was initially developed to address a weakness in the Bell-LaPadula model, which only addressed confidentiality.(2)

Additional Resources:

  • lock BibaModel.pdf: PDF of the 1977 "Integrity Considerations for Secure Computer Systems" paper, which introduced the revised Biba security model (Log-in required).

  • oh411deb.pdf: 2012 CBI oral history with David Bell, with a discussion of the Biba Model.


1 : Karl de Leeuw and Jan Bergstra, eds., The History of Information Security: A Comprehensive Handbook (New York: Elsevier, 2007), 628-629.

2 : http://en.wikipedia.org/wiki/Biba_Model

Edit | WYSIWYG | Attach |  PDF |  History: r17 | r8 < r7 < r6 < r5 |  Backlinks |  Raw View | More topic actions...
Topic revision: r6 - 16 May 2013 - 15:09:09 - NicLewis
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback