Chinese Wall Security Model and Conflict Analysis

نویسنده

  • Tsau Young Lin
چکیده

Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, this paper introduced a practical way of computing an extended model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Chinese wall security for decentralized workflow management systems

Workflow systems are gaining importance as an infrastructure for automating inter-organizational interactions, such as those in Electronic Commerce. In such an environment, a centralized Workflow Management System is not desirable because: (i) it can be a performance bottleneck, and (ii) the systems are inherently distributed, heterogeneous, and autonomous in nature. Decentralized execution of ...

متن کامل

A new Access Control model based on the Chinese Wall Security Policy Model

Access control policies and models guide the successful implementation of well-defined access control requirements, which are used for the protection of information or data objects in an information system environment. Whenever these objects are used in a data mining environment, a change in the access control requirements is needed. During a data mining activity, the data miner may expose unex...

متن کامل

Chinese Wall Security Model for Workflow Management Systems with Dynamic Security Policy

Secure workflow management systems (WfMSs) are required to support major security features such as authentication, confidentiality, data integrity, and nonrepudiation. The Chinese wall security model (CWSM) was designed to provide access controls that mitigate conflict of interest in commercial organizations, and is especially important for large-scale interenterprise workflow applications. Thi...

متن کامل

A Trace - Based Model of theChinese Wall Security

The Chinese Wall security policy is a well known information control policy used in the commercial world to specify control over information when connicts of interest arise. A trace-based information ow control model for the Chinese Wall security policy is presented. This model is enhanced to permit connict time frames for obtained information and revocation of access rights to a particular dat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000