Specification and validation of a security policy model

Author(s):  
Tony Boswell
Keyword(s):  
Author(s):  
Vladimir Jovanovikj ◽  
Dušan Gabrijelčič ◽  
Tomaž Klobučar

2008 ◽  
pp. 1096-1107
Author(s):  
Tsau Young Lin

In 1989, Brewer and Nash (BN) proposed the Chinese Wall Security Policy (CWSP). Intuitively speaking, they want to build a family of impenetrable walls, called Chinese walls, among the datasets of competing companies so that no datasets that are in conflict can be stored in the same side of Chinese walls. Technically, the idea is: (X, Y) Ï CIR (= the binary relation of conflict of interests) if and only if (X, Y) Ï CIF (= the binary relation of information flows). Unfortunately, BN’s original proof has a major flaw (Lin, 1989). In this chapter, we have established and generalized the idea using an emerging technology, granular computing.


2014 ◽  
Vol 644-650 ◽  
pp. 1835-1839 ◽  
Author(s):  
Si Ping Liu

Based on the threats of cloud computing security, combined with the principle of private cloud computing, this paper introduces the variable dimension fractal theory into the cloud computing and security policy model, and puts forwards multidimensional data model C2MDSM of the cloud computation. The model can protect 2D and 3D protection of user information in a private cloud space. Through the 3D fractal it greatly improves the user use of cloud resources, and improves the security of information, which realizes the true sense of the reasonable distribution for cloud resources. In order to verify the validity of the mathematical model and the algorithm designed in this paper, we use the MATLAB software to draw 2D and 3D fractal, and obtain the number of cloud users, security level and calculation residual results. It provides the technical reference for the research on cloud computing.


Sign in / Sign up

Export Citation Format

Share Document