Title :
Managing information flows on discretionary access control models
Author_Institution :
San Jose State Univ., San Jose
Abstract :
In 1989, Brewer and Nash (BN) presented a fascinating idea, called Chinese wall security policy model, for commercial security. Their idea was based on the analysis of the notion, conflict of interest binary relation (CIR). Unfortunately, their formalization did not fully catch the appropriate properties of CIR. In this paper, we present a theory based on granulation that has captured the essence of BN´s intuitive idea. The results are more than the Chinese wall models: malicious Trojan horses in certain DAC model (discretionary access control) can be controlled or confined.
Keywords :
authorisation; invasive software; conflict of interest binary relation; discretionary access control; information flow management; malicious Trojan horse; Access control; Computer errors; Computer security; Conference management; Cybernetics; Data security; Erbium; Information management; Information security; Invasive software; Chinese Wall Security policy; binary relation; equivalence relation; information flows;
Conference_Titel :
Systems, Man and Cybernetics, 2006. SMC '06. IEEE International Conference on
Conference_Location :
Taipei
Print_ISBN :
1-4244-0099-6
DOI :
10.1109/ICSMC.2006.385057