{"title":"A new Chinese wall security policy model based on the subject's wall and object's wall","authors":"Saad Fehis, O. Nouali, Mohand Tahar Kechadi","doi":"10.1109/ANTI-CYBERCRIME.2015.7351943","DOIUrl":null,"url":null,"abstract":"To controlling the information flows between the competing companies (CC) in the cloud computing (Multi-tenancy) or in the social network, the Chinese wall security policy (CWSP) is very interesting solution. Its rule is the building of the walls between the CC. The CWSPs idea, is the building of impenetrable wall among subject, and this to controlling the information flow between the CC, caused by the subjects. However, the preview proposed models [1-6]; they have a set of errors and they can't fix the composite information flows (CIF) problem between the CC (a malicious Trojan horses problem). In this article; we will propose a new approach based on the access query type of the subject to the objects and the philosophy of the CWSP. In our model we have two types walls placement, the first are built around the subject, and the second around the object; which, we can't find inside each once wall two competing objects data.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"42 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 First International Conference on Anti-Cybercrime (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351943","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
To controlling the information flows between the competing companies (CC) in the cloud computing (Multi-tenancy) or in the social network, the Chinese wall security policy (CWSP) is very interesting solution. Its rule is the building of the walls between the CC. The CWSPs idea, is the building of impenetrable wall among subject, and this to controlling the information flow between the CC, caused by the subjects. However, the preview proposed models [1-6]; they have a set of errors and they can't fix the composite information flows (CIF) problem between the CC (a malicious Trojan horses problem). In this article; we will propose a new approach based on the access query type of the subject to the objects and the philosophy of the CWSP. In our model we have two types walls placement, the first are built around the subject, and the second around the object; which, we can't find inside each once wall two competing objects data.