The following are the current most viewed articles on Wikipedia within Wikipedia's Computer security models category. Think of it as a What's Hot list for Computer security models. More info »
This is a beta release and so the figures may be a day or two out of date. We'd love to get your thoughts.
|1||Role-based access control||666|
|2||Ring (computer security)||451|
|3||Mandatory access control||327|
|4||Bell-La Padula model||260|
|5||Discretionary access control||215|
|10||Access Control Matrix||77|
|11||Computer security policy||70|
|13||Lattice-based access control||51|
|14||High-water mark (computer security)||38|
|17||Brewer and Nash model||31|
|18||NIST RBAC model||29|
|19||Take-grant protection model||26|
|22||Low watermark (computer security)||19|
This category contains articles describing computer security models that are or have been used in practical systems or proposed in theory.
This category has only the following subcategory.
The following 26 pages are in this category, out of 26 total. This list may not reflect recent changes (learn more).