The Chinese Wall policy was identified and so named by Brewer and Nash. This policy arises in the financial segment of the commercial sector, which provides consulting services to other companies. Consultants naturally have to deal with confidential company information for their clients. The objective of the Chinese Wall policy is to prevent information flows which cause conflict of interest for individual consultants. Brewer and Nash develop a mathematical model of the Chinese Wall policy, on the basis of which they claim that this policy ''cannot be correctly represented by a Bell-LaPadula model.'' In this paper we demonstrate that the Brewer-Nash model is too restrictive to be employed in a practical system. This is due to their treatment of users and subjects as synonymous concepts, with the consequence that they do not distinguish security policy as applied to human users versus security policy as applied to computer subjects. By maintaining a careful distinction between users, principals and subjects, we show that the Chinese Wall policy is just another lattice-based information policy which can be easily represented within the Bell-LaPadula framework.
[1]
Michael J. Nash,et al.
The Chinese Wall security policy
,
1989,
Proceedings. 1989 IEEE Symposium on Security and Privacy.
[2]
Dorothy E. Denning,et al.
A lattice model of secure information flow
,
1976,
CACM.
[3]
D. Elliott Bell,et al.
Secure Computer System: Unified Exposition and Multics Interpretation
,
1976
.
[4]
John McLean,et al.
A Comment on the 'Basic Security Theorem' of Bell and LaPadula
,
1985,
Inf. Process. Lett..
[5]
Jerome H. Saltzer,et al.
The protection of information in computer systems
,
1975,
Proc. IEEE.