The Limes Security Model for Information Flow Control

Publikation: Beitrag in Buch/Bericht/TagungsbandKonferenzbeitragBegutachtung

3 Zitate (Scopus)

Abstract

In the business world, the protection of information and data objects and their well-directed flow is essential for the success of enterprises. The Chinese Wall Security Policy model (CWSP model), defined by Brewer and Nash in [1], provides access control based on the definition of conflict of interest classes. This model addresses in particular the commercial business sector. In their model Brewer and Nash made the implicit assumption that a conflict of interest is an equivalence relation. Lin [2] presented a modified version of the model called the Aggressive Chinese Wall Security Policy model (ACWSP model). He showed in [5] that the "conflict of interest" is a binary relation, but not, in general, an equivalence relation like Brewer and Nash assumed. Lin observed that the Conflict of Interest relation is symmetric but non-reflexive and non-transitive. In the world of business, symmetric conflict of interest classes are not the default. In this paper a new model is presented that is based on a non-symmetric, non-reflexive and non-transitive conflict of interest relation, where each object is allowed to define its own time dependent Conflict Function and Conflict Of Interest List. Before a subject is allowed to do a write access to an object, each object that has been read accessed by the same subject before has to acknowledge that it is free of conflict with the object the subject intends to write access currently. Otherwise the write access is denied.

OriginalspracheEnglisch
TitelProceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011
Herausgeber (Verlag)IEEE Computer Society Press
Seiten573-580
Seitenumfang8
ISBN (Print)9780769544854
DOIs
PublikationsstatusVeröffentlicht - 2011
VeranstaltungSixth IEEE International Conference on Availability, Reliability and Security (ARES) - Vienna, Österreich
Dauer: 22 Aug. 201126 Aug. 2011

Publikationsreihe

NameProceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011

Konferenz

KonferenzSixth IEEE International Conference on Availability, Reliability and Security (ARES)
Land/GebietÖsterreich
OrtVienna
Zeitraum22.08.201126.08.2011

Fingerprint

Untersuchen Sie die Forschungsthemen von „The Limes Security Model for Information Flow Control“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren