Sciweavers

19 search results - page 2 / 4
» Chinese Wall Security Model and Conflict Analysis
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 1 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
DGO
2007
123views Education» more  DGO 2007»
13 years 10 months ago
Cross-national information policy conflict regarding access to information: building a conceptual framework
This paper addresses cross-national information policy conflict regarding access to information. This type of information policy conflict appears more complex and controversial th...
Lei Zheng
BIRTHDAY
2010
Springer
13 years 8 months ago
Specifying and Verifying Organizational Security Properties in First-Order Logic
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell–La Padula. We show t...
Christoph Brandt, Jens Otten, Christoph Kreitz, Wo...
SAJ
2000
129views more  SAJ 2000»
13 years 8 months ago
Conflict analysis as a means of enforcing static separation of duty requirements in workflow environments
The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever...
Stephen Perelson, Reinhardt A. Botha
ACSAC
2001
IEEE
14 years 19 days ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad