A Trace - Based Model of theChinese Wall Security
نویسندگان
چکیده
The Chinese Wall security policy is a well known information control policy used in the commercial world to specify control over information when connicts of interest arise. A trace-based information ow control model for the Chinese Wall security policy is presented. This model is enhanced to permit connict time frames for obtained information and revocation of access rights to a particular data object. The trace-based model is shown to be less restrictive, more robust, and more precise than existing Chinese Wall security policy models. Abstract The Chinese Wall security policy is a well known information control policy used in the commercial world to specify control over information when connicts of interest arise. A trace-based information ow control model for the Chinese Wall security policy is presented. This model is enhanced to permit connict time frames for obtained information and revocation of access rights to a particular data object. The trace-based model is shown to be less restrictive, more robust, and more precise than existing Chinese Wall security policy models.
منابع مشابه
A LATTICE INTERPRETATION OF THECHINESE WALL POLICYRavi
The Chinese Wall policy was identiied and so named by Brewer and Nash 2]. This policy arises in the segment of the commercial sector which provides consulting services to other companies. Consultants naturally have to deal with conndential company information for their clients. The objective of the Chinese Wall policy is to prevent information ows which cause connict of interest for individual ...
متن کاملA Trace-Based Model of the Chinese Wall Security Policy
The Chinese Wall security policy is a well known information control policy used in the commercial world to specify control over information when con icts of interest arise. A tracebased information ow control model for the Chinese Wall security policy is presented. This model is enhanced to permit con ict time frames for obtained information and revocation of access rights to a particular data...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملNonlinear modeling of the infill wall based on the brittle cracking model
Abstract: This paper introduces a new numerical method for the analysis of infilled steel frames with hollow clay blocks. This approach is based on the brittle cracking model of ABAQUS. The results of the in-plane calibration analyses obtained with four experimental tests are presented and discussed. The first test was a bare steel frame used as a control specimen. The second was similar to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999