DocumentCode :
3708320
Title :
A new Chinese wall security policy model based on the subject´s wall and object´s wall
Author :
Saad Fehis;Omar Nouali;Tahar Kechadi
Author_Institution :
National School of Computer, Algiers, Algeria
fYear :
2015
Firstpage :
1
Lastpage :
6
Abstract :
To controlling the information flows between the competing companies (CC) in the cloud computing (Multi-tenancy) or in the social network, the Chinese wall security policy (CWSP) is very interesting solution. Its rule is the building of the walls between the CC. The CWSPs idea, is the building of impenetrable wall among subject, and this to controlling the information flow between the CC, caused by the subjects. However, the preview proposed models [1-6]; they have a set of errors and they can´t fix the composite information flows (CIF) problem between the CC (a malicious Trojan horses problem). In this article; we will propose a new approach based on the access query type of the subject to the objects and the philosophy of the CWSP. In our model we have two types walls placement, the first are built around the subject, and the second around the object; which, we can´t find inside each once wall two competing objects data.
Keywords :
"Companies","Security","Writing","Buildings","Data models","Computational modeling","Electronic mail"
Publisher :
ieee
Conference_Titel :
Anti-Cybercrime (ICACC), 2015 First International Conference on
Type :
conf
DOI :
10.1109/Anti-Cybercrime.2015.7351943
Filename :
7351943
Link To Document :
بازگشت