Sciweavers

15 search results - page 1 / 3
» The Chinese Wall Security Policy
Sort
View
COMPSAC
2000
IEEE
13 years 9 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 8 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
POLICY
2007
Springer
13 years 10 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
13 years 8 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian