A history-based model of the enhanced Chinese Wall policy

被引:0
|
作者
Zhao, QS [1 ]
Sun, YF
Liang, HL
Zhang, XF
Sun, B
Bi, XD
机构
[1] Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
[2] Shandong Univ, Grad Sch, Jinan 250100, Peoples R China
关键词
information security; Chinese Wall policy; history-based model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Chinese Wall security policy, identified and so named by Brewer and Nash, is an important commercial policy. Its basic idea is to prevent information flows that cause conflicts of interest for individual consultants. A history-based information flow control model for Chinese Wall security policy is presented in this paper. This model can more precisely and factually enforce Chinese Wall policy than other models.
引用
收藏
页码:439 / 443
页数:5
相关论文
共 50 条
  • [1] A scalable history-based policy engine
    Gama, Pedro
    Ribeiro, Carlos
    Ferreira, Paulo
    [J]. SEVENTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 100 - +
  • [2] Heimdhal: A History-based Policy Engine for Grids
    Garria, Pedro
    Ribeiro, Carlos
    Ferreira, Paulo
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID: SPANNING THE WORLD AND BEYOND, 2006, : 481 - +
  • [3] History-based Model Repair Recommendations
    Ohrndorf, Manuel
    Pietsch, Christopher
    Kelter, Udo
    Grunske, Lars
    Kehrer, Timo
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (02)
  • [4] History-based trust negotiation model
    赵贻竹
    赵彦华
    鲁宏伟
    [J]. Advances in Manufacturing, 2009, (02) : 150 - 154
  • [5] A History-based Constraint for Separation-of-Duty Policy in Role Based Access Control Model
    Wang, Duoqiang
    Liu, Wengfang
    Lu, Jianfeng
    Ma, Xiaopu
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 195 - 199
  • [6] Personalized pricing versus history-based pricing: implications for privacy policy
    Miettinen, Topi
    Stenbacka, Rune
    [J]. INFORMATION ECONOMICS AND POLICY, 2015, 33 : 56 - 68
  • [7] REVISION: A Tool for History-based Model Repair Recommendations
    Ohrndorf, Manuel
    Pietsch, Christopher
    Kelter, Udo
    Kehrer, Timo
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 105 - 108
  • [8] A First-Order Policy Language for History-Based Transaction Monitoring
    Bauer, Andreas
    Gore, Rajeev
    Tiu, Alwen
    [J]. THEORETICAL ASPECTS OF COMPUTING - ICTAC 2009, 2009, 5684 : 96 - 111
  • [9] Enforcement of U-XACML History-Based Usage Control Policy
    Martinelli, Fabio
    Matteucci, Ilaria
    Mori, Paolo
    Saracino, Andrea
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 64 - 81
  • [10] A new Chinese Wall Security Policy Model Based On the Subject's Wall and Object's Wall
    Fehis, Saad
    Nouali, Omar
    Kechadi, Tahar
    [J]. 2015 FIRST INTERNATIONAL CONFERENCE ON ANTI-CYBERCRIME (ICACC), 2015, : 90 - 95