Chinese Wall Security Policy Model: Granular Computing on DAC Model

Chinese Wall Security Policy Model: Granular Computing on DAC Model

Tsau Young Lin
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3.ch075
Cite Chapter Cite Chapter

MLA

Lin, Tsau Young. "Chinese Wall Security Policy Model: Granular Computing on DAC Model." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 1096-1107. https://doi.org/10.4018/978-1-59904-937-3.ch075

APA

Lin, T. Y. (2008). Chinese Wall Security Policy Model: Granular Computing on DAC Model. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 1096-1107). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch075

Chicago

Lin, Tsau Young. "Chinese Wall Security Policy Model: Granular Computing on DAC Model." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 1096-1107. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch075

Export Reference

Mendeley
Favorite

Abstract

In 1989, Brewer and Nash (BN) proposed the Chinese Wall Security Policy (CWSP). Intuitively speaking, they want to build a family of impenetrable walls, called Chinese walls, among the datasets of competing companies so that no datasets that are in conflict can be stored in the same side of Chinese walls. Technically, the idea is: (X, Y) Ï CIR (= the binary relation of conflict of interests) if and only if (X, Y) Ï CIF (= the binary relation of information flows). Unfortunately, BN’s original proof has a major flaw (Lin, 1989). In this chapter, we have established and generalized the idea using an emerging technology, granular computing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.