What security model has 8 rules?

A.
Graham-Denning
B.
Harrison-Ruzzo-Ullman
C.
TCSEC
D.
Zachman Framework
Explanation:
Answer A is correct; Graham-Denning has eight rules: Transfer Access, Grant Access, Delete Access, Read Object, Create Object, Destroy Object, Create Subject, and Destroy Subject.Incorrect Answers and Explanations: B, C, and D: Answers B, C, and D are incorrect. Harrison-Ruzzo-Ullman is based on Graham-Denning, and has six primitive operations. TCSEC has four classes, from A to D: The Zachman Framework has six frameworks (what, how, where, who, when, and why), mapped across rules including planner, owner, designer, builder, programmer, and user.
Graham-Denning has eight rules:
1. Transfer Access,
2. Grant Access,
3. Delete Access,
4. Read Object,
5. Create Object,
6. Destroy Object,
7. Create Subject,
8. Destroy Subject.
Harrison-Ruzzo-Ullman is based on Graham-Denning, and has six primitive operations
TCSEC has four classes, from A to D
0
0
Class A – Verified protection
Class B – MAC Mandatory protection apply
Class C – DAC discretionary protection
Class D – Security
0
0