You are here

A new Chinese Wall Security Policy Model Based On the Subject’s Wall and Object’s Wall

Authors: 

Tahar Kechadi, Omar Nouali, Saad Fehis

Publication Type: 
Refereed Conference Meeting Proceeding
Abstract: 
To controlling the information flows between the competing companies (CC) in the cloud computing (Multitenancy) or in the social network, the Chinese wall security policy (CWSP) is very interesting solution. Its rule is the building of the walls between the CC. The CWSPs idea, is the building of impenetrable wall among subject, and this to controlling the information flow between the CC, caused by the subjects. However, the preview proposed models [1-6]; they have a set of errors and they can’t fix the composite information flows (CIF) problem between the CC (a malicious Trojan horses problem). In this article; we will propose a new approach based on the access query type of the subject to the objects and the philosophy of the CWSP. In our model we have two types walls placement, the first are built around the subject, and the second around the object; which, we can’t find inside each once wall two competing objects data.
Conference Name: 
1st International Conference on Anti-Cybercrime (ICACC 2015
Digital Object Identifer (DOI): 
10.na
Publication Date: 
09/02/2015
Conference Location: 
Saudi Arabia
Institution: 
National University of Ireland, Dublin (UCD)
Open access repository: 
Yes