0% found this document useful (0 votes)
1K views8 pages

Biba Model

The Biba Integrity Model developed by Kenneth Biba in 1977 is a formal system for enforcing data integrity in computer systems. It consists of a set of access control rules and labels objects and subjects with integrity levels. The primary goal of the Biba model is to prevent unauthorized modification of data from both authorized and unauthorized parties while maintaining internal and external consistency. It includes both mandatory and discretionary access control policies to enforce integrity through control of access modes like modify, observe, invoke and execute based on integrity labels.

Uploaded by

Danish Soonka
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views8 pages

Biba Model

The Biba Integrity Model developed by Kenneth Biba in 1977 is a formal system for enforcing data integrity in computer systems. It consists of a set of access control rules and labels objects and subjects with integrity levels. The primary goal of the Biba model is to prevent unauthorized modification of data from both authorized and unauthorized parties while maintaining internal and external consistency. It includes both mandatory and discretionary access control policies to enforce integrity through control of access modes like modify, observe, invoke and execute based on integrity labels.

Uploaded by

Danish Soonka
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

m m

The Biba Model or Biba Integrity Model developed by Kenneth J.


Biba in 1977,is a formal state transition system of computer
security policy that describes a set of access control rules
designed to ensure data integrity.
The Bell-LaPadula model gurantees confidentiality of data but
not its integrity. The Biba model proposed a group of integrity
policies that can be used. So, the Biba model is acutally family
of different integrity policies. Each of the policies uses different
conditions to ensure information integrity (Castano). The Biba
model, in turn, uses both discretionary and nondiscretionary
policies.
m 
m 


 Prevent data modification by unauthorized


parties
 Prevent unauthorized data modification by
authorized parties
 Maintain internal and external consistency (i.e.
data reflects the real world)

 In a computer system there are a set of subjects
and a set of objects. Subjects are the
 active components in the system such as
processes created by the users. On the other
 hand, objects are a set of protected entities in the
system such as files.
 The Biba model requires that each subject and
object is given an integrity label.
 The Biba model can use both static and dynamic
labels. Dynamic labels allow the integrity levels to
vary.
 
 The Biba Model consists of group access modes. The access modes
are similar to those used in other models, although the may use
different terms to define them. The access modes that the Biba
model supports are:

 1. Modify: allows a subject to write to an object. This mode is similar


to the write mode in other models.

 2. Observe: allows a subject to read an object. This command is


synonyms with the read command of other models.

 3. Invoke: allows a subject to communicate with another subject.

 4. Execute: allows a subject to execute an object. The command


essentially allows a subject to execute a program which is the object.

 mm  

   m



Mandatory Policies:
 1. Strict Integrity Policy
 2. Low-Water-Mark Policy for Subjects
 3. Low-Water-Mark Policy for Objects
 4. Low-Water-Mark Integrity Audit Policy
 5. Ring Policy

Discretionary Policies:
 1. Access Control Lists
 2. Object Hierarchy
 3. Ring
 

 The first benefit of the model is that it is fairly easy


to implement. It is no harder to implement the
strict integrity policy in the Biba model, compared
to the Bell-LaPadula model.
 Another advantage is that the Biba model provides
a number of different policies that can be selected
based on need.
 If the strict integrity property is too restricting, one
of the dynamic policies could be used in its place.
m  

 The first problem with this model is selecting the right
policy to implement.
 The model gives a number of different policies that can
be used. On one hand, it provides more flexibility and,
on the other hand, the large number of polices can
make it hard to select the right policy.
 Another problem is the model does nothing to enforce
confidentiality. For this reason, the Biba model should
be combined with another model.
 A model such as the Bell-LaPadula could be used to
complement it.
Õ Õ 
The primary motivation for establishing the Biba Integrity
Model was because the Bell- LaPadula model only
controls confidentiality in the system. The Biba model
was one of the first models that addressed the
enforcement of integrity. The Biba model is
essentially a family of different policies that can be used
to enforce integrity.

You might also like