Brewer and Nash model

Brewer and Nash model

The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also known as the Chinese wall model, was designed to provide controls that mitigate conflict of interest in commercial organizations, and is built upon an information flow model.

In the Brewer and Nash Model no information can flow between the subjects and objects in a way that would create a conflict of interest.

ee also

* Biba model
* Clark-Wilson model
* Graham-Denning model
* Bell-LaPadula model

References

*Harris, Shon, All-in-one CISSP Exam Guide, Third Edition, McGraw Hill Osborne, Emeryvill, California, 2005.

External links

*cite paper
author = Dr. David F.C. Brewer and Dr. Michael J. Nash
title = The Chinese Wall Security Policy
publisher = IEEE
date= 1989
booktitle = in: Proceedings of IEEE Symposium on Security and Privacy, 1989, pp. 206-214
url = http://www.cs.purdue.edu/homes/ninghui/readings/AccessControl/brewer_nash_89.pdf


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Graham-Denning model — The Graham Denning Model is a security model that shows how subjects and objects should be created and deleted.It also addresses how to assign specific access rights.This model addresses the security issues associated with how to define a set of… …   Wikipedia

  • Computer security model — A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical… …   Wikipedia

  • Chinese wall — For other uses, see Chinese wall (disambiguation). In business, a Chinese wall or firewall is an information barrier implemented within a firm to separate and isolate persons who make investment decisions from persons who are privy to undisclosed …   Wikipedia

  • Computer security policy — A computer security policy defines the goals and elements of an organization s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical… …   Wikipedia

  • 1986 — This article is about the year 1986. For the NBC News Magazine, see 1986 (News Magazine). Millennium: 2nd millennium Centuries: 19th century – 20th century – 21st century Decades: 1950s  1960s  1970s  – 1980s –… …   Wikipedia

  • List of people from Michigan — A list of notable people from the U.S. state of Michigan. Bolding indicates places in Michigan. People from Michigan are sometimes referred to as Michiganders, Michiganians, or more rarely as Michiganites. Actors, entertainers and… …   Wikipedia

  • English literature — Introduction       the body of written works produced in the English language by inhabitants of the British Isles (including Ireland) from the 7th century to the present day. The major literatures written in English outside the British Isles are… …   Universalium

  • performing arts — arts or skills that require public performance, as acting, singing, or dancing. [1945 50] * * * ▪ 2009 Introduction Music Classical.       The last vestiges of the Cold War seemed to thaw for a moment on Feb. 26, 2008, when the unfamiliar strains …   Universalium

  • Jerry Garcia — Background information Birth name Jerome John Garcia Born August 1, 1942 San Francisco, California …   Wikipedia

  • Mandatory Access Control — (MAC) („zwingend erforderliche Zugangskontrolle“) ist ein Oberbegriff für Konzepte zur Kontrolle und Steuerung von Zugriffsrechten, vor allem auf IT Systemen. Die Entscheidungen über Zugriffsberechtigungen werden nicht nur auf der Basis der… …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”