Brewer and Nash model

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by HaeB (talk | contribs) at 06:31, 4 May 2018 (Reverted 1 edit by 2601:155:8302:6755:591B:D911:1573:89D2 (talk): Already mentioned above. (TW)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also known as the Chinese wall model, was designed to provide controls that mitigate conflict of interest in commercial organizations, and is built upon an information flow model.

In the Brewer and Nash Model no information can flow between the subjects and objects in a way that would create a conflict of interest.

See also

References

  • Harris, Shon, All-in-one CISSP Exam Guide, Third Edition, McGraw Hill Osborne, Emeryville, California, 2005.

External links

  • Dr. David F.C. Brewer and Dr. Michael J. Nash (1989). "The Chinese Wall Security Policy" (PDF). IEEE. {{cite journal}}: Cite journal requires |journal= (help); Unknown parameter |booktitle= ignored (help)