Lattice-based enforcement of Chinese Walls

نویسنده

  • Ravi S. Sandhu
چکیده

The Chinese Wall policy was identi ed and so named by Brewer and Nash [2]. This policy arises in the nancial segment of the commercial sector, which provides consulting services to other companies. Consultants naturally have to deal with con dential company information for their clients. The objective of the Chinese Wall policy is to prevent information ows which cause con ict of interest for individual consultants. Brewer and Nash develop a mathematical model of the Chinese Wall policy, on the basis of which they claim that this policy \cannot be correctly represented by a Bell-LaPadula model." In this paper we demonstrate that the Brewer-Nash model is too restrictive to be employed in a practical system. This is due to their treatment of users and subjects as synonymous concepts, with the consequence that they do not distinguish security policy as applied to human users versus security policy as applied to computer subjects. By maintaining a careful distinction between users, principals and subjects, we show that the Chinese Wall policy is just another lattice-based information policy which can be easily represented within the Bell-LaPadula framework.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

-Implementation of lattice Boltzmann method to study mixing reduction in isothermal electroosmotic pump with hydrophobic walls

The aim of the present work is to analyze the accuracy and to extend the capability of lattice Boltzmann method in slip EOF; a phenomenon which was previously studied by molecular dynamics and less considered by LBM. At the present work, a numerical experiment on boundary conditions of slip velocity is performed and the proportionality of slip with shear stress in electroosmotic pump is proved....

متن کامل

Lattice - Based Enforcement of Chinese

The Chinese Wall policy was identiied and so named by Brewer and Nash 2]. This policy arises in the nancial segment of the commercial sector, which provides consulting services to other companies. Consultants naturally have to deal with conndential company information for their clients. The objective of the Chinese Wall policy is to prevent information ows which cause connict of interest for in...

متن کامل

Implementation of D3Q19 Lattice Boltzmann Method with a Curved Wall Boundary Condition for Simulation of Practical Flow Problems

In this paper, implementation of an extended form of a no-slip wall boundary condition is presented for the three-dimensional (3-D) lattice Boltzmann method (LBM) for solving the incompressible fluid flows with complex geometries. The boundary condition is based on the off-lattice scheme with a polynomial interpolation which is used to reconstruct the curved or irregular wall boundary on the ne...

متن کامل

Boundary conditions for the lattice Boltzmann method

Based on the no-slip boundary condition for walls at rest for the lattice Boltzmann Bathnagar-Gross-Krook method by J.C.G. Verschaeve [10], a no-slip boundary condition for walls with a tangential movement is derived. Numerical tests verify that the present boundary condition is second order accurate and stable for relaxation frequencies close to two.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 11  شماره 

صفحات  -

تاریخ انتشار 1992