Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses
نویسنده
چکیده
منابع مشابه
Information Flow Control among Objects: Taking Foreign Objects into Control
This paper proposes a model to control information flows among objects. It improves flexibility of the control by independently assigning security levels to attributes, arguments, and return values. It uses associations and multiple labels to control information flows among objects that may be dynamically instantiated during program execution. According to our survey, no model offers the contro...
متن کاملA Trace - Based Model of theChinese Wall Security
The Chinese Wall security policy is a well known information control policy used in the commercial world to specify control over information when connicts of interest arise. A trace-based information ow control model for the Chinese Wall security policy is presented. This model is enhanced to permit connict time frames for obtained information and revocation of access rights to a particular dat...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملA Trace-Based Model of the Chinese Wall Security Policy
The Chinese Wall security policy is a well known information control policy used in the commercial world to specify control over information when con icts of interest arise. A tracebased information ow control model for the Chinese Wall security policy is presented. This model is enhanced to permit con ict time frames for obtained information and revocation of access rights to a particular data...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کامل