Discussion 4: What is the relative positioning of the Bell La Pudula, Biba Integrity and Clark and Wilson models? How do you see one complementing the other?
All the security models have their specific implementations designed for effective user security controls. The Bell La Pudula security model is commonly used in government and military applications where confidentiality is the primary concern. Many governmental agencies restrict user access to systems and files based on the philosophy of a need-to-know basis. Example, the military leverages this model because most of their information may be considered confidential or top secret. They also have a high concern for various cyber attacks by both domestic and foreign intruders. However, the