Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Biba KJ (1977) Integrity considerations for secure computer systems. MTR-3153. The Mitre Corporation
Bishop M (2002) Computer security art and science. Addison Wesley Professional, Boston, MA
Kim D (2010) Fundamentals of information system security. Jones and Bartlett Learning, Sadbury, MA
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Aaron Estes, C. (2011). Biba Integrity Model. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_774
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_774
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering