The Biba Integrity Model developed by Kenneth Biba in 1977 is a formal system for enforcing data integrity in computer systems. It consists of a set of access control rules and labels objects and subjects with integrity levels. The primary goal of the Biba model is to prevent unauthorized modification of data from both authorized and unauthorized parties while maintaining internal and external consistency. It includes both mandatory and discretionary access control policies to enforce integrity through control of access modes like modify, observe, invoke and execute based on integrity labels.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
1K views8 pages
Biba Model
The Biba Integrity Model developed by Kenneth Biba in 1977 is a formal system for enforcing data integrity in computer systems. It consists of a set of access control rules and labels objects and subjects with integrity levels. The primary goal of the Biba model is to prevent unauthorized modification of data from both authorized and unauthorized parties while maintaining internal and external consistency. It includes both mandatory and discretionary access control policies to enforce integrity through control of access modes like modify, observe, invoke and execute based on integrity labels.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8
m m
The Biba Model or Biba Integrity Model developed by Kenneth J.
Biba in 1977,is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity. The Bell-LaPadula model gurantees confidentiality of data but not its integrity. The Biba model proposed a group of integrity policies that can be used. So, the Biba model is acutally family of different integrity policies. Each of the policies uses different conditions to ensure information integrity (Castano). The Biba model, in turn, uses both discretionary and nondiscretionary policies. m m
Prevent data modification by unauthorized
parties Prevent unauthorized data modification by authorized parties Maintain internal and external consistency (i.e. data reflects the real world)
In a computer system there are a set of subjects and a set of objects. Subjects are the active components in the system such as processes created by the users. On the other hand, objects are a set of protected entities in the system such as files. The Biba model requires that each subject and object is given an integrity label. The Biba model can use both static and dynamic labels. Dynamic labels allow the integrity levels to vary.
The Biba Model consists of group access modes. The access modes are similar to those used in other models, although the may use different terms to define them. The access modes that the Biba model supports are:
1. Modify: allows a subject to write to an object. This mode is similar
to the write mode in other models.
2. Observe: allows a subject to read an object. This command is
synonyms with the read command of other models.
3. Invoke: allows a subject to communicate with another subject.
4. Execute: allows a subject to execute an object. The command
essentially allows a subject to execute a program which is the object.
mm
m
Mandatory Policies: 1. Strict Integrity Policy 2. Low-Water-Mark Policy for Subjects 3. Low-Water-Mark Policy for Objects 4. Low-Water-Mark Integrity Audit Policy 5. Ring Policy
Discretionary Policies: 1. Access Control Lists 2. Object Hierarchy 3. Ring
The first benefit of the model is that it is fairly easy
to implement. It is no harder to implement the strict integrity policy in the Biba model, compared to the Bell-LaPadula model. Another advantage is that the Biba model provides a number of different policies that can be selected based on need. If the strict integrity property is too restricting, one of the dynamic policies could be used in its place. m
The first problem with this model is selecting the right policy to implement. The model gives a number of different policies that can be used. On one hand, it provides more flexibility and, on the other hand, the large number of polices can make it hard to select the right policy. Another problem is the model does nothing to enforce confidentiality. For this reason, the Biba model should be combined with another model. A model such as the Bell-LaPadula could be used to complement it. Õ Õ The primary motivation for establishing the Biba Integrity Model was because the Bell- LaPadula model only controls confidentiality in the system. The Biba model was one of the first models that addressed the enforcement of integrity. The Biba model is essentially a family of different policies that can be used to enforce integrity.