[1989 Proceedings] Fifth Annual Computer Security Applications Conference
DOI: 10.1109/csac.1989.81064
|View full text |Cite
|
Sign up to set email alerts
|

Chinese wall security policy-an aggressive model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
63
0

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 71 publications
(63 citation statements)
references
References 1 publication
0
63
0
Order By: Relevance
“…In Lin's model the partition based on the complement of the CIR relation (induced equivalence relation), can overlap if the CIR relation is not "ant-transitive", case named by Lin as a "Bad CIR Relation" (page 10 in (Lin, 2003)), so a real case excluded by Lin's model! Also, we are observing, that, Lin in (Lin, 1989)- (Lin, 2007) fix the problems of the DIF / CIF by the using of the same BN's idea (Brewer & Nash, 1989), unsanitized/sanitized information and also the read/write access type, where: In BN the unsanitized information is confined to its selfcompany but in Lin to allied dataset. So, the inheriting of the problem (Sandhu, 1992) "consultant to work for one company only" to "consultant to work for one allied companies only".…”
Section: Related Work Based On Access Matrixmentioning
confidence: 99%
See 3 more Smart Citations
“…In Lin's model the partition based on the complement of the CIR relation (induced equivalence relation), can overlap if the CIR relation is not "ant-transitive", case named by Lin as a "Bad CIR Relation" (page 10 in (Lin, 2003)), so a real case excluded by Lin's model! Also, we are observing, that, Lin in (Lin, 1989)- (Lin, 2007) fix the problems of the DIF / CIF by the using of the same BN's idea (Brewer & Nash, 1989), unsanitized/sanitized information and also the read/write access type, where: In BN the unsanitized information is confined to its selfcompany but in Lin to allied dataset. So, the inheriting of the problem (Sandhu, 1992) "consultant to work for one company only" to "consultant to work for one allied companies only".…”
Section: Related Work Based On Access Matrixmentioning
confidence: 99%
“…However, and after analyses of the previous proposed models (Brewer & Nash, 1989)- (Sandhu, 1992), and theirs applications (Atluri et al, 2004) (Hsiao & Hwang, 2010) (Wu et al, 2010) (Tsai et al, 2011) (Kesarwani et al, 2011) (Xie et al, 2013) (Alqahtani, Gamble, & Ray, 2013) (Minsky, 2004), we are surprising by many problems. For example the problem of the Conflict of interest (COI) is a set of disjoint class or a binary relation (CIR), the error was fixed in 1989 by Lin (Lin, 1989)- (Lin, 2007), but to our days there are many applications based on COI classes and not a CIR binary relation.…”
Section: Related Work Based On Access Matrixmentioning
confidence: 99%
See 2 more Smart Citations
“…Singleton lower and upper approximations were studied in [8,9,16,18,19]. Note that similar three definitions of lower and upper approximations, though not for incomplete decision tables, were studied in [10][11][12][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%