A New Distributed Chinese Wall Security Policy Model
نویسندگان
چکیده
منابع مشابه
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street wi~l have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on Integrity Policy for Computer Information Systems) has drawn attention to the existence of a wide range of commercial security policies which are both significantly different from each other and quite alien to current “...
متن کاملA Trace-Based Model of the Chinese Wall Security Policy
The Chinese Wall security policy is a well known information control policy used in the commercial world to specify control over information when con icts of interest arise. A tracebased information ow control model for the Chinese Wall security policy is presented. This model is enhanced to permit con ict time frames for obtained information and revocation of access rights to a particular data...
متن کاملA new Access Control model based on the Chinese Wall Security Policy Model
Access control policies and models guide the successful implementation of well-defined access control requirements, which are used for the protection of information or data objects in an information system environment. Whenever these objects are used in a data mining environment, a change in the access control requirements is needed. During a data mining activity, the data miner may expose unex...
متن کاملChinese Wall Security Model for Workflow Management Systems with Dynamic Security Policy
Secure workflow management systems (WfMSs) are required to support major security features such as authentication, confidentiality, data integrity, and nonrepudiation. The Chinese wall security model (CWSM) was designed to provide access controls that mitigate conflict of interest in commercial organizations, and is especially important for large-scale interenterprise workflow applications. Thi...
متن کاملChinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, this paper introduced a practical way of computing an extended model.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Digital Forensics, Security and Law
سال: 2016
ISSN: 1558-7223
DOI: 10.15394/jdfsl.2016.1434