scispace - formally typeset
Proceedings ArticleDOI

Modeling Chinese wall access control using formal concept analysis

TLDR
The main objective is to model the Chinese wall access control policy using formal concept analysis which extends and restructures the lattice theory and confirms that the proposed method satisfies the constraints of Chinese wall security policy and its properties such as simple security and *-property.
Abstract
Chinese wall access control (CWAC) is a well known and suitable access control model for secured sharing of commercial consultancy services. It is to avoid the information flow which causes conflict of interest for every individual consultant in these services. The main objective is to model the Chinese wall access control policy using formal concept analysis which extends and restructures the lattice theory. To attain this goal, we develop a formal context in the security aspects of Chinese wall access permissions. We experiment the proposed method in a common commercial consultancy service sharing scenario. The analysis results confirms that the proposed method satisfies the constraints of Chinese wall security policy and its properties such as simple security and *-property.

read more

Citations
More filters
Journal ArticleDOI

Role based access control design using three-way formal concept analysis

TL;DR: Three-way formal concept analysis (3WCA) is presented on how 3WCA can provide suitable representation ofRBAC policy and whether this representation follows role hierarchy and constraints of RBAC.
Proceedings ArticleDOI

Inter-domain role based access control using ontology

TL;DR: This paper proposes a procedure to transform the access permission matrix of multiple domain environments into inter-domain access control ontology and shows that it is possible to formalize ontology for access permission of inter- domain security policy without any conflicts in terms ofinter-domain roles, services and domains in multipledomain environments.
Journal ArticleDOI

A novel method for merging academic social network ontologies using formal concept analysis and hybrid semantic similarity measure

TL;DR: A new method called HSSM-based ontology merging using formal concept analysis (FCA) and semantic similarity measure is proposed and used to merge the academic social network ontologies.
Book ChapterDOI

Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis

TL;DR: The objective of this paper is to propose the model of representing FRBAC in the form of FFCA, and the initial results show that the proposed model could implement the major features of RBAC.
Journal ArticleDOI

A FCA framework for inference control in data integration systems

TL;DR: A methodology that allows the security administrator to derive a set of queries that, combined, could disclose sensitive information and a run-time solution for neutralizing all suspicious queries while ensuring a trade-off between data protection and data availability is proposed.
References
More filters
Book ChapterDOI

Restructuring lattice theory: an approach based on hierarchies of concepts

TL;DR: Restructuring lattice theory is an attempt to reinvigorate connections with the authors' general culture by interpreting the theory as concretely as possible, and in this way to promote better communication between lattice theorists and potential users of lattices theory.
Journal ArticleDOI

Formal Concept Analysis

TL;DR: FCA explicitly formalises extension and intension of a concept, their mutual relationships, and the fact that increasing intent implies decreasing extent and vice versa, and allows to derive a concept hierarchy from a given dataset.
Proceedings ArticleDOI

The Chinese Wall security policy

D.F.C. Brewer, +1 more
TL;DR: The authors explore a commercial security policy (the Chinese Wall) which represents the behavior required of those persons who perform corporate analysis for financial institutions and concludes that it is perhaps as significant to the financial world as Bell-LaPadula's policies are to the military.
Journal ArticleDOI

Lattice-based access control models

TL;DR: A balanced perspective on lattice-based access control models is provided and information flow policies, the military lattice,Access control models, the Bell-LaPadula model, the Biba model and duality, and the Chinese Wall lattice are reviewed.
Related Papers (5)