By Topic

Chinese wall security policy-an aggressive model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Lin, T.Y. ; Dept. of Comput. Sci., California State Univ., Northridge, CA, USA

In Brewer and Nash's Chinese Wall security policy model, there is a very strong implicit assumption that the `conflict of interest' is an equivalence relation. It is called the BN-axiom. Such axiom is valid only for some very special circumstances. By modifying their formulation, a modified Brewer and Nash model without BN-axiom is defined. Such model turns out to be rather `conservative' in the sense that the Chinese Walls are built within Chinese territory; it is not really a Chinese Wall model. Next, a new formal model is introduced in which Chinese Walls are built right on the boundary of China-an aggressive model for Chinese Wall security policy

Published in:

Computer Security Applications Conference, 1989., Fifth Annual

Date of Conference:

4-8 Dec 1989