- Brewer and Nash model
The Brewer and Nash model was constructed to provide
information security access controls that can change dynamically. This security model, also known as theChinese wall model, was designed to provide controls that mitigateconflict of interest in commercial organizations, and is built upon aninformation flow model .In the Brewer and Nash Model no information can flow between the subjects and objects in a way that would create a conflict of interest.
ee also
*
Biba model
*Clark-Wilson model
*Graham-Denning model
*Bell-LaPadula model References
*Harris, Shon, All-in-one CISSP Exam Guide, Third Edition, McGraw Hill Osborne, Emeryvill, California, 2005.
External links
*cite paper
author = Dr. David F.C. Brewer and Dr. Michael J. Nash
title = The Chinese Wall Security Policy
publisher = IEEE
date= 1989
booktitle = in: Proceedings of IEEE Symposium on Security and Privacy, 1989, pp. 206-214
url = http://www.cs.purdue.edu/homes/ninghui/readings/AccessControl/brewer_nash_89.pdf
Wikimedia Foundation. 2010.