This category contains articles describing computer security models that are or have been used in practical systems or proposed in theory.