DocumentCode :
3081079
Title :
Managing information flows on discretionary access control models
Author :
Tsau Young Lin
Author_Institution :
San Jose State Univ., San Jose
Volume :
6
fYear :
2006
fDate :
8-11 Oct. 2006
Abstract :
In 1989, Brewer and Nash (BN) presented a fascinating idea, called Chinese wall security policy model, for commercial security. Their idea was based on the analysis of the notion, conflict of interest binary relation (CIR). Unfortunately, their formalization did not fully catch the appropriate properties of CIR. In this paper, we present a theory based on granulation that has captured the essence of BN´s intuitive idea. The results are more than the Chinese wall models: malicious Trojan horses in certain DAC model (discretionary access control) can be controlled or confined.
Keywords :
authorisation; invasive software; conflict of interest binary relation; discretionary access control; information flow management; malicious Trojan horse; Access control; Computer errors; Computer security; Conference management; Cybernetics; Data security; Erbium; Information management; Information security; Invasive software; Chinese Wall Security policy; binary relation; equivalence relation; information flows;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Man and Cybernetics, 2006. SMC '06. IEEE International Conference on
Conference_Location :
Taipei
Print_ISBN :
1-4244-0099-6
Type :
conf
DOI :
10.1109/ICSMC.2006.385057
Filename :
4274666
Link To Document :
بازگشت