All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Chinese wall
Known as:
Chinese walls
, Business Information Barrier
, Clean-room reverse engineering
Â
(More)
Chinese wall is a business term describing an information barrier within an organization that was erected to prevent exchanges or communication that…Â
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1989-2017
0
5
10
1989
2017
Related topics
Related topics
10 relations
Computer science
Computer security
Computer security model
Computer security policy
(More)
Broader (1)
Data security
Related mentions per year
Related mentions per year
1956-2018
1960
1980
2000
2020
Chinese wall
Computer science
Operating system
Computer security
Reverse engineering
Data integrity
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2004
2004
Chinese wall security for decentralized workflow management systems
Vijayalakshmi Atluri
,
Soon Ae Chun
,
Pietro Mazzoleni
Journal of Computer Security
2004
Workflow systems are gaining importance as an infrastructure for automating inter-organizational interactions, such as those in…Â
(More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A Chinese wall security model for decentralized workflow systems
Vijayalakshmi Atluri
,
Soon Ae Chun
,
Pietro Mazzoleni
ACM Conference on Computer and Communications…
2001
Workflow systems are gaining importance as an infrastructure for automating inter-organizational interactions, such as those in…Â
(More)
Is this relevant?
2000
2000
Chinese Wall Security Model and Conflict Analysis
Tsau Young Lin
COMPSAC
2000
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security…Â
(More)
Is this relevant?
1997
1997
Building Chinese walls in standard unixTM
Simon N. Foley
Computers & Security
1997
The set-user-id facility in Unix can be used to form the basis for the implementation of a wide variety of different security…Â
(More)
Is this relevant?
1996
1996
Building Chinese Walls in Standard Unix
Simon N. Foley
1996
The set-user-id facility in Unix can be used to form the basis for the implementation of a wide variety of diierent security…Â
(More)
Is this relevant?
1992
1992
On the Chinese Wall Model
Volker Kessler
ESORICS
1992
We present a modified version of the Chinese Wall model. Especially, we make some investigations on the indirect information flow…Â
(More)
Is this relevant?
1992
1992
Lattice-based enforcement of Chinese Walls
Ravi S. Sandhu
Computers & Security
1992
The Chinese Wall policy was identi ed and so named by Brewer and Nash [2]. This policy arises in the nancial segment of the…Â
(More)
Is this relevant?
1992
1992
A Lattice Interpretation of the Chinese Wall Policy
Ravi S. Sandhu
1992
The Chinese Wall policy was identi ed and so named by Brewer and Nash [2]. This policy arises in the segment of the commercial…Â
(More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
The Chinese Wall Security Policy
D. F. C. Brewer
,
Michael J. Nash
IEEE Symposium on Security and Privacy
1989
Everyone who has seen the movie Wall Street wi~l have seen a commercial security policy in action. The recent work of Clark and…Â
(More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Chinese wall security policy-an aggressive model
Tsau Young Lin
ACSAC
1989
I n B r e w e r a n d NaSh 'S C h i n e s e V a l 1 s e c u r i t y p o l i c y m o d e l , t h e r e i s a v e r y s t r o n g i…Â
(More)
Is this relevant?