"Biba-Modell"@de . . . . . . "Das Biba-Sicherheitsmodell dient zur Kontrolle von Lese- und Schreibzugriffen in Computersystemen anhand von existierenden Benutzerrechten und deren Einstufung in ein policy-basierendes Autorisierungssystem. Das Biba-Modell wurde 1975 von beschrieben. Gegenstand des Modells ist die Integrit\u00E4t der Daten. Das Biba-Modell ist eine Umkehrung des Bell-LaPadula-Sicherheitsmodelles, welches vor allem die Vertraulichkeit von Datenzugriffen anspricht. Eine Variation des Biba-Modell ist auch unter der Bezeichnung Low Watermark Mandatory Access Control bekannt. Beispiel:"@de . "Il modello di integrit\u00E0 Biba venne sviluppato nel 1977 da K.J. Biba del M.I.T., per aggirare le debolezze del modello di protezione per sistemi operativi di computer denominato modello di riservatezza di Bell-LaPadula, il quale non prevedeva la possibilit\u00E0 di eliminazione implicita degli oggetti di sicurezza scritti da loro. Il modello di Biba comprendeva tre politiche, di cui una era il duale matematico del modello Bell-LaPadula, ed il sistema consiste in una serie di soggetti, oggetti e livelli di integrit\u00E0. In generale, preservare l'integrit\u00E0 aveva tre obbiettivi:"@it . . "Modello Biba"@it . . "Biba Model"@en . "The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1975, is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject. In general the model was developed to address integrity as the core principle, which is the direct inverse of the Bell\u2013LaPadula model which focuses on confidentiality."@en . . . "O modelo Biba ou Modelo de Integridade Biba, desenvolvido por Kenneth J. Biba em 1977, \u00E9 um para que descreve um conjunto de regras de controle de acesso destinadas a assegurar a integridade de dados. O modelo Biba utiliza agrupamentos de dados e sujeitos em n\u00EDveis ordenados de integridade, para que um sujeito n\u00E3o possa corromper objetos em um n\u00EDvel mais alto que o seu, ou ser corrompido por objetos de um n\u00EDvel inferior ao seu. Em geral, o modelo Biba foi desenvolvido para contornar uma fraqueza no Modelo Bell\u2013LaPadula, que \u00E9 direcionado apenas para a confidencialidade de dados."@pt . . "Le mod\u00E8le de Biba ou mod\u00E8le d'int\u00E9grit\u00E9 de Biba, d\u00E9velopp\u00E9 par en 1977 est un automate formalis\u00E9 qui repr\u00E9sente une politique de s\u00E9curit\u00E9 informatique. L'automate d\u00E9crit des r\u00E8gles de contr\u00F4le d'acc\u00E8s afin de garantir l'int\u00E9grit\u00E9 des donn\u00E9es. Le mod\u00E8le est con\u00E7u de mani\u00E8re que les intervenants ne soient pas en mesure de corrompre des donn\u00E9es plac\u00E9es dans un niveau qui leur est sup\u00E9rieur, ou \u00EAtre corrompus par des donn\u00E9es d'un niveau inf\u00E9rieur \u00E0 celui de l'intervenant. Ce mod\u00E8le fut invent\u00E9 pour r\u00E9soudre les faiblesses du mod\u00E8le de Bell-LaPadula qui ne s'occupe que de la confidentialit\u00E9 et ne prend pas en compte l'int\u00E9grit\u00E9 des donn\u00E9es."@fr . . . "664924"^^ . . . . "O modelo Biba ou Modelo de Integridade Biba, desenvolvido por Kenneth J. Biba em 1977, \u00E9 um para que descreve um conjunto de regras de controle de acesso destinadas a assegurar a integridade de dados. O modelo Biba utiliza agrupamentos de dados e sujeitos em n\u00EDveis ordenados de integridade, para que um sujeito n\u00E3o possa corromper objetos em um n\u00EDvel mais alto que o seu, ou ser corrompido por objetos de um n\u00EDvel inferior ao seu. Em geral, o modelo Biba foi desenvolvido para contornar uma fraqueza no Modelo Bell\u2013LaPadula, que \u00E9 direcionado apenas para a confidencialidade de dados."@pt . . . . "\u041C\u043E\u0434\u0435\u043B\u044C \u0411\u0456\u0431\u0438"@uk . . . . "4023"^^ . . . "\u041C\u043E\u0434\u0435\u043B\u044C \u0411\u0456\u0431\u0438 - \u0444\u043E\u0440\u043C\u0430\u043B\u044C\u043D\u0430 \u043C\u043E\u0434\u0435\u043B\u044C \u0440\u043E\u0437\u0440\u043E\u0431\u043B\u0435\u043D\u0430 \u041A\u0435\u043D\u043D\u0435\u0442\u043E\u043C \u0414\u0436. \u0411\u0456\u0431\u043E\u044E \u0443 1975,, \u043A\u043E\u043C\u043F\u2019\u044E\u0442\u0435\u0440\u043D\u043E\u0457 \u043F\u043E\u043B\u0456\u0442\u0438\u043A\u0438 \u0431\u0435\u0437\u043F\u0435\u043A\u0438 \u0441\u043A\u0456\u043D\u0447\u0435\u043D\u043D\u043E\u0433\u043E \u0430\u0432\u0442\u043E\u043C\u0430\u0442\u0443, \u044F\u043A\u0430 \u043E\u043F\u0438\u0441\u0443\u0454 \u043F\u0440\u0430\u0432\u0438\u043B\u0430 \u0434\u043E\u0441\u0442\u0443\u043F\u0443, \u043F\u0440\u0438\u0437\u043D\u0430\u0447\u0435\u043D\u0456 \u0434\u043B\u044F \u0437\u0430\u0431\u0435\u0437\u043F\u0435\u0447\u0435\u043D\u043D\u044F \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456 \u0434\u0430\u043D\u0438\u0445. \u0414\u0430\u043D\u0456 \u0442\u0430 \u0441\u0443\u0431\u2019\u0454\u043A\u0442\u0438 \u0433\u0440\u0443\u043F\u0443\u044E\u0442\u044C\u0441\u044F \u0432 \u0443\u043F\u043E\u0440\u044F\u0434\u043A\u043E\u0432\u0430\u043D\u0456 \u0440\u0456\u0432\u043D\u0456 \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456. \u041C\u043E\u0434\u0435\u043B\u044C \u0440\u043E\u0437\u0440\u043E\u0431\u043B\u0435\u043D\u0430 \u0442\u0430\u043A\u0438\u043C \u0447\u0438\u043D\u043E\u043C, \u0449\u043E\u0431 \u0441\u0443\u0431\u2019\u0454\u043A\u0442\u0438 \u043D\u0435 \u043C\u043E\u0433\u043B\u0438 \u0437\u0440\u0443\u0439\u043D\u0443\u0432\u0430\u0442\u0438 \u043E\u0431\u2019\u0454\u043A\u0442\u0438 \u0437 \u0440\u0456\u0432\u043D\u0435\u043C \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456, \u0432\u0438\u0449\u0438\u043C \u043D\u0456\u0436 \u0441\u0443\u0431\u2019\u0454\u043A\u0442\u0456\u0432, \u0430\u0431\u043E \u0431\u0443\u0442\u0438 \u0437\u0440\u0443\u0439\u043D\u043E\u0432\u0430\u043D\u0438\u043C\u0438 \u0437\u0430\u0441\u043E\u0431\u0430\u043C\u0438 \u0437 \u0440\u0456\u0432\u043D\u0435\u043C \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456, \u043D\u0438\u0436\u0447\u0438\u043C \u043D\u0456\u0436 \u0440\u0456\u0432\u0435\u043D\u044C \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456 \u0441\u0443\u0431\u2019\u0454\u043A\u0442\u0430. \u0423 \u0437\u0430\u0433\u0430\u043B\u044C\u043D\u043E\u043C\u0443 \u0432\u0438\u043F\u0430\u0434\u043A\u0443 \u043C\u043E\u0434\u0435\u043B\u044C \u0454 \u043F\u0440\u044F\u043C\u043E\u044E \u0456\u043D\u0432\u0435\u0440\u0441\u0456\u0454\u044E \u043C\u043E\u0434\u0435\u043B\u0456 \u0411\u0435\u043B\u0430-\u041B\u0430\u041F\u0430\u0434\u0443\u043B\u0438."@uk . . . "Mod\u00E8le de Biba"@fr . . . . . "The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1975, is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject."@en . . . . "Il modello di integrit\u00E0 Biba venne sviluppato nel 1977 da K.J. Biba del M.I.T., per aggirare le debolezze del modello di protezione per sistemi operativi di computer denominato modello di riservatezza di Bell-LaPadula, il quale non prevedeva la possibilit\u00E0 di eliminazione implicita degli oggetti di sicurezza scritti da loro. Il modello di Biba comprendeva tre politiche, di cui una era il duale matematico del modello Bell-LaPadula, ed il sistema consiste in una serie di soggetti, oggetti e livelli di integrit\u00E0. In generale, preservare l'integrit\u00E0 aveva tre obbiettivi: \n* Prevenire la modifica dei dati da oggetti non autorizzati; \n* Prevenire modifiche non autorizzate ai dati da oggetti autorizzati; \n* Mantenere la consistenza interna ed esterna (es.: dati che rispecchino il mondo reale). Il modello Biba implementa le protezioni definendo una serie ordinata di livelli di integrit\u00E0 per i soggetti e gli oggetti, rispettando la regola del: leggere sopra e scrivere sotto: \n* Questo significa che un soggetto che si trova al livello di integrit\u00E0 X pu\u00F2 leggere solo oggetti allo stesso livello o superiore (assioma di integrit\u00E0 semplice); \n* Similarmente, un soggetto al livello di integrit\u00E0 X pu\u00F2 scrivere solo oggetti allo stesso livello o di livello pi\u00F9 basso (assioma di integrit\u00E0 \"*\"); \n* Un soggetto al livello di integrit\u00E0 X pu\u00F2 chiamare solo un altro soggetto che si trovi allo stesso livello di integrit\u00E0 o pi\u00F9 basso."@it . . "Le mod\u00E8le de Biba ou mod\u00E8le d'int\u00E9grit\u00E9 de Biba, d\u00E9velopp\u00E9 par en 1977 est un automate formalis\u00E9 qui repr\u00E9sente une politique de s\u00E9curit\u00E9 informatique. L'automate d\u00E9crit des r\u00E8gles de contr\u00F4le d'acc\u00E8s afin de garantir l'int\u00E9grit\u00E9 des donn\u00E9es. Le mod\u00E8le est con\u00E7u de mani\u00E8re que les intervenants ne soient pas en mesure de corrompre des donn\u00E9es plac\u00E9es dans un niveau qui leur est sup\u00E9rieur, ou \u00EAtre corrompus par des donn\u00E9es d'un niveau inf\u00E9rieur \u00E0 celui de l'intervenant."@fr . . . . . . "1120050736"^^ . "Das Biba-Sicherheitsmodell dient zur Kontrolle von Lese- und Schreibzugriffen in Computersystemen anhand von existierenden Benutzerrechten und deren Einstufung in ein policy-basierendes Autorisierungssystem. Das Biba-Modell wurde 1975 von beschrieben. Gegenstand des Modells ist die Integrit\u00E4t der Daten. Das Biba-Modell ist eine Umkehrung des Bell-LaPadula-Sicherheitsmodelles, welches vor allem die Vertraulichkeit von Datenzugriffen anspricht. Eine Variation des Biba-Modell ist auch unter der Bezeichnung Low Watermark Mandatory Access Control bekannt. Es werden vor jedem Zugriff zwei Regeln \u00FCberpr\u00FCft: 1. \n* No-Read-Down: Es darf einer h\u00F6her eingestuften Ebene nicht m\u00F6glich sein, Informationen einer tieferen Sicherheitsebene zu lesen. 2. \n* No-Write-Up: Es darf Schichten, welche \u00FCber eine tiefere Sicherheitsebene verf\u00FCgen, nicht erlaubt sein, Daten in eine h\u00F6here Sicherheitsebene zu schreiben. Beispiel: \n* Kalibrationsdaten eines EKG d\u00FCrfen von normalen Benutzern nur gelesen werden, nie geschrieben, da den Daten nicht vertraut werden kann (no-write-up). \n* Weiterhin darf der Kalibrationsvorgang nie Daten lesen, die von einem normalen Benutzer erstellt worden sind, da diese nicht gen\u00FCgend Integrit\u00E4t besitzen (no-read-down)."@de . "Modelo Biba"@pt . . . . "\u041C\u043E\u0434\u0435\u043B\u044C \u0411\u0456\u0431\u0438 - \u0444\u043E\u0440\u043C\u0430\u043B\u044C\u043D\u0430 \u043C\u043E\u0434\u0435\u043B\u044C \u0440\u043E\u0437\u0440\u043E\u0431\u043B\u0435\u043D\u0430 \u041A\u0435\u043D\u043D\u0435\u0442\u043E\u043C \u0414\u0436. \u0411\u0456\u0431\u043E\u044E \u0443 1975,, \u043A\u043E\u043C\u043F\u2019\u044E\u0442\u0435\u0440\u043D\u043E\u0457 \u043F\u043E\u043B\u0456\u0442\u0438\u043A\u0438 \u0431\u0435\u0437\u043F\u0435\u043A\u0438 \u0441\u043A\u0456\u043D\u0447\u0435\u043D\u043D\u043E\u0433\u043E \u0430\u0432\u0442\u043E\u043C\u0430\u0442\u0443, \u044F\u043A\u0430 \u043E\u043F\u0438\u0441\u0443\u0454 \u043F\u0440\u0430\u0432\u0438\u043B\u0430 \u0434\u043E\u0441\u0442\u0443\u043F\u0443, \u043F\u0440\u0438\u0437\u043D\u0430\u0447\u0435\u043D\u0456 \u0434\u043B\u044F \u0437\u0430\u0431\u0435\u0437\u043F\u0435\u0447\u0435\u043D\u043D\u044F \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456 \u0434\u0430\u043D\u0438\u0445. \u0414\u0430\u043D\u0456 \u0442\u0430 \u0441\u0443\u0431\u2019\u0454\u043A\u0442\u0438 \u0433\u0440\u0443\u043F\u0443\u044E\u0442\u044C\u0441\u044F \u0432 \u0443\u043F\u043E\u0440\u044F\u0434\u043A\u043E\u0432\u0430\u043D\u0456 \u0440\u0456\u0432\u043D\u0456 \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456. \u041C\u043E\u0434\u0435\u043B\u044C \u0440\u043E\u0437\u0440\u043E\u0431\u043B\u0435\u043D\u0430 \u0442\u0430\u043A\u0438\u043C \u0447\u0438\u043D\u043E\u043C, \u0449\u043E\u0431 \u0441\u0443\u0431\u2019\u0454\u043A\u0442\u0438 \u043D\u0435 \u043C\u043E\u0433\u043B\u0438 \u0437\u0440\u0443\u0439\u043D\u0443\u0432\u0430\u0442\u0438 \u043E\u0431\u2019\u0454\u043A\u0442\u0438 \u0437 \u0440\u0456\u0432\u043D\u0435\u043C \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456, \u0432\u0438\u0449\u0438\u043C \u043D\u0456\u0436 \u0441\u0443\u0431\u2019\u0454\u043A\u0442\u0456\u0432, \u0430\u0431\u043E \u0431\u0443\u0442\u0438 \u0437\u0440\u0443\u0439\u043D\u043E\u0432\u0430\u043D\u0438\u043C\u0438 \u0437\u0430\u0441\u043E\u0431\u0430\u043C\u0438 \u0437 \u0440\u0456\u0432\u043D\u0435\u043C \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456, \u043D\u0438\u0436\u0447\u0438\u043C \u043D\u0456\u0436 \u0440\u0456\u0432\u0435\u043D\u044C \u0446\u0456\u043B\u0456\u0441\u043D\u043E\u0441\u0442\u0456 \u0441\u0443\u0431\u2019\u0454\u043A\u0442\u0430. \u0423 \u0437\u0430\u0433\u0430\u043B\u044C\u043D\u043E\u043C\u0443 \u0432\u0438\u043F\u0430\u0434\u043A\u0443 \u043C\u043E\u0434\u0435\u043B\u044C \u0454 \u043F\u0440\u044F\u043C\u043E\u044E \u0456\u043D\u0432\u0435\u0440\u0441\u0456\u0454\u044E \u043C\u043E\u0434\u0435\u043B\u0456 \u0411\u0435\u043B\u0430-\u041B\u0430\u041F\u0430\u0434\u0443\u043B\u0438."@uk . . . . . . . .