EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions

Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1317 Nov 2014 - 10:46ThomasMisa 
1203 Oct 2013 - 15:25norqu036? 
1128 Aug 2013 - 13:19norqu036? 
1003 Jun 2013 - 09:16NicLewis 
931 May 2013 - 14:49NicLewis 
831 May 2013 - 11:40NicLewis 
731 May 2013 - 09:35NicLewis 
620 May 2013 - 10:16NicLewis 
527 Mar 2013 - 09:41NicLewis 
425 Mar 2013 - 11:29NicLewis 
earlier first

Render style:     Context:

 History: r13 | r6 < r5 < r4 < r3
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>PubClarkWilson (revision 4)

Clark-Wilson Model


First described in 1987, the Clark-Wilson Model is not a specific security policy, but a guideline for formalizing security policies. Unlike the Biba Model, which is most useful in classification systems where data confidentiality are the primary concern, as in the military, the Clark-Wilson Model is primarily concerned with data integrity.(1) This focus makes the Clark-Wilson Model of greater interest in commercial applications, such as accounting and business. The Clark-Wilson Model emerged as the dominance of multi-user operating systems was giving way to single-user personal computer commercial applications, and marks an important point in the development of computing security in PC information technology.(2)

Additional Resources:

  • lock clark_wilson.pdf: 1987 paper, "A Comparison of Commercial and Military Computer Security Policies," that originally described the Clark-Wilson Model (Log-in required).

  • oh411deb.pdf: 2012 CBI oral history with David Bell, with a discussion of the Clark-Wilson Model.


1 : http://en.wikipedia.org/wiki/The_Clark-Wilson_Integrity_Model

2 : Karl de Leeuw and Jan Bergstra, eds., The History of Information Security: A Comprehensive Handbook (New York: Elsevier, 2007), 629-630.

Edit | WYSIWYG | Attach |  PDF |  History: r13 | r6 < r5 < r4 < r3 |  Backlinks |  Raw View | More topic actions...
Topic revision: r4 - 25 Mar 2013 - 11:29:18 - NicLewis
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback