The Chinese Wall security policy

@article{Brewer1989TheCW,
  title={The Chinese Wall security policy},
  author={D. F. Brewer and M. Nash},
  journal={Proceedings. 1989 IEEE Symposium on Security and Privacy},
  year={1989},
  pages={206-214}
}
  • D. F. Brewer, M. Nash
  • Published 1989
  • Computer Science
  • Proceedings. 1989 IEEE Symposium on Security and Privacy
  • The authors explore a commercial security policy (the Chinese Wall) which represents the behavior required of those persons who perform corporate analysis for financial institutions. It can be distinguished from Bell-LaPadula-like policies by the way that a user's permitted accesses are constrained by the history of his previous accesses. It is shown that the formal representation of the policy correctly permits a market analyst to talk to any corporation which does not create a conflict of… CONTINUE READING

    Figures and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    A Lattice Interpretation Of The Chinese Wall Policy
    • 48
    • Highly Influenced
    • PDF
    Chinese wall security policy-an aggressive model
    • 136
    • PDF
    Lattice-based enforcement of Chinese Walls
    • 58
    • PDF
    A Chinese Wall approach to privacy policies for the Web
    • 12
    • Highly Influenced
    Least-restrictive enforcement of the Chinese wall security policy
    • 15
    • Highly Influenced
    A Risk Management Approach to the "Insider Threat"
    • 39
    • PDF
    Security policies to mitigate insider threat in the document control domain
    • 42
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 11 REFERENCES
    A Comparison of Commercial and Military Computer Security Policies
    • 1,332
    • PDF
    Secure Computer System: Unified Exposition and Multics Interpretation
    • 2,087
    • Highly Influential
    • PDF
    The algebra of security
    • 112
    • PDF
    Secure Computer Systems: Unified Exposition and Multics Interpretation" ESD-TR-75-306
    • 1976
    The Corporate Implications of Commercial Security Policies
    • 1989
    Her Majesty's Stationery Office, London, Financial Services Act
    • 1986
    Her Majesty's Stationery Office, London, Securities and Investment Board Rules
      Secure Computer Systems: Unified Exposition and Multics Interpretation" ESD-TR-75-306, MTR 2997 Rev. 1, The MITRE Corporation
      • 1976
      The Corporate Implications of Commercial Security Policies
      • 1989