Granular computing: structures, representations, and applications
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
Covering based granular computing for conflict analysis
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
In 1989, Brewer and Nash presented a Chinese Wall Security Policy model (CWSP); the model exited the whole conference. The intuition is to place Chinese Wall on the boundary of the conflict of interests classes so that information flow among competing companies cannot occur. Unfortunately, later in the same year, we pointed out their erroneous assumption that the conflict of interests relation (CIR) is an equivalence relation; and presented an aggressiveChinese Wall Security Policy model (ACWSP) that was based on an analysis of CIR as a binary relation. Based on our relative recent observation that each binary relation induces an equivalence relation, we show that ACWSP can be strengthened by the induced equivalence relation; intuitively the walls are placed on the boundary of induced equivalence classes.