A new Access Control model based on the Chinese Wall Security Policy Model
نویسندگان
چکیده
Access control policies and models guide the successful implementation of well-defined access control requirements, which are used for the protection of information or data objects in an information system environment. Whenever these objects are used in a data mining environment, a change in the access control requirements is needed. During a data mining activity, the data miner may expose unexpected results or trends. All companies involved in data mining activities should be aware of these potential access control problems. Effective security policies can, however, help resolve these problems. Brewer and Nash (1989) first defined the Chinese Wall Security Policy model (CWSP model). This model provides access control for the commercial environment based on conflict of interest classes. Shortly after the introduction of the model, Lin (1989) reported an error and presented a modified version of the model called the Aggressive Chinese Wall Security Policy model (ACWSP model). This model introduced the concept of an overlap between conflict of interest classes. When the access control requirements needed for a data mining environment were investigated, it became evident that these two models did not fully comply with the requirements. The purpose of this article is to discuss a new access control model, based on the Chinese Wall Security Policy model, for a data mining environment. This new model will cover the access control requirements not met in the existing models. With this new access control model, data miners will be able to work on different company information or data objects without causing access control problems such as information leakage following exposure to unexpected results or trends. All companies involved in data mining activities will be able to control their level of exposure among competitive peer companies if they use the proposed access control model. The new model is dynamic in that it can cope with a rapidly changing business environment.
منابع مشابه
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملA combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملA Trace - Based Model of theChinese Wall Security
The Chinese Wall security policy is a well known information control policy used in the commercial world to specify control over information when connicts of interest arise. A trace-based information ow control model for the Chinese Wall security policy is presented. This model is enhanced to permit connict time frames for obtained information and revocation of access rights to a particular dat...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کامل